Introduction to the Art of Picking
Locks
Vilnius - 17/05/2013
Introduction
“Lock picking is the art of unlocking a lock by
analyzing and manipulating the components
of the lock device, without the original key.”
Wikipedia
2
Pin Tumbler Lock’s Anatomy
3
Shell: contains all of the internal
components.
Plug: is the active and rotating component
of the pin tumbler lock.
Keyway: limits the number of keys that can
enter the lock.
Key: is the device used to unlock the lock.
Pins: also called tumblers. Provides the
security locking mechanism.
Springs: force each tumbler-set into the
plug and maintain the integrity of the pin-
stack while the key is inserted and
removed.
Shear line: is the level to which all pins
must be raised in order for the plug to
rotate.
How a Lock works
4
Shear line
Lockpicking Tools
5
How to Pick a Lock
6
4 1 5 3 2
Plug
1)  Apply torque in the same direction that you would
turn the key
2)  Use the pick to push up the pins
3)  Since most locks are not built absolutely perfect…
4)  The goal here is to press each pair of pins until you
hear a “click”.
Security Pins
7
Spool Mushroom
Serrated
Bibliography
8
http://www.gregmiller.net/locks/mitguide/
http://www.lockwiki.com/
http://www.ssdev.org/SSDeV/start.php

More Related Content

PDF
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
PDF
Certificate Pinning in Mobile Applications
PDF
Mobile Network Security: a tale of tracking, spoofing and owning mobile phone...
PDF
iParanoid: an IMSI Catcher - Stingray Intrusion Detection System
PDF
LOCKSMITH IN DUBLIN
PDF
KEY REPLACEMENT IN DUBLIN
PPTX
Lock Picking and Bypass Techniques - Understanding the Art of Locksmithing
PPTX
Lock Picking and Bypass Techniques - Understanding the Art of Locksmithing
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
Certificate Pinning in Mobile Applications
Mobile Network Security: a tale of tracking, spoofing and owning mobile phone...
iParanoid: an IMSI Catcher - Stingray Intrusion Detection System
LOCKSMITH IN DUBLIN
KEY REPLACEMENT IN DUBLIN
Lock Picking and Bypass Techniques - Understanding the Art of Locksmithing
Lock Picking and Bypass Techniques - Understanding the Art of Locksmithing

Similar to Lockpicking Baltic Cyber Security Forum 2013 (8)

PPT
Locksmithing
PDF
TYPES OF LOCKS.pdf
PPTX
Protective locks and key control
PPTX
FINGERPRINT DOORLOCK USING ARDUINO UNO _
PPTX
Chubb lock replacement.pptx
PPTX
lawenforcementadministrationii-140112075537-phpapp02.pptx
PDF
[Illegal] improvised lock picks
PDF
Paxton Access 746-284-US Instruction Manual
Locksmithing
TYPES OF LOCKS.pdf
Protective locks and key control
FINGERPRINT DOORLOCK USING ARDUINO UNO _
Chubb lock replacement.pptx
lawenforcementadministrationii-140112075537-phpapp02.pptx
[Illegal] improvised lock picks
Paxton Access 746-284-US Instruction Manual
Ad

More from Luca Bongiorni (6)

PDF
HandPwning Security pitfalls of biometric hand-geometry recognition access co...
PDF
ANP catalog: the adversarial ninja playset
PDF
Manufacturing Hardware Implants from Idea to Mass Production: A Hacker's Journey
PDF
How to bring HID attacks to next level with WHID Injector & P4wnP1
PDF
Mobile Network Security: Quanto sono sicure le reti cellulari? - Smau Milano ...
PPT
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
HandPwning Security pitfalls of biometric hand-geometry recognition access co...
ANP catalog: the adversarial ninja playset
Manufacturing Hardware Implants from Idea to Mass Production: A Hacker's Journey
How to bring HID attacks to next level with WHID Injector & P4wnP1
Mobile Network Security: Quanto sono sicure le reti cellulari? - Smau Milano ...
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
Ad

Recently uploaded (20)

PDF
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
PDF
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
PDF
Data Virtualization in Action: Scaling APIs and Apps with FME
PPTX
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
PPTX
future_of_ai_comprehensive_20250822032121.pptx
PDF
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
PPTX
SGT Report The Beast Plan and Cyberphysical Systems of Control
PDF
Early detection and classification of bone marrow changes in lumbar vertebrae...
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PPTX
Training Program for knowledge in solar cell and solar industry
PDF
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
PPTX
Microsoft User Copilot Training Slide Deck
PDF
Introduction to MCP and A2A Protocols: Enabling Agent Communication
PDF
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
PDF
Comparative analysis of machine learning models for fake news detection in so...
PDF
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
PDF
A symptom-driven medical diagnosis support model based on machine learning te...
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PPTX
MuleSoft-Compete-Deck for midddleware integrations
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
Data Virtualization in Action: Scaling APIs and Apps with FME
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
future_of_ai_comprehensive_20250822032121.pptx
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
SGT Report The Beast Plan and Cyberphysical Systems of Control
Early detection and classification of bone marrow changes in lumbar vertebrae...
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
Training Program for knowledge in solar cell and solar industry
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
Microsoft User Copilot Training Slide Deck
Introduction to MCP and A2A Protocols: Enabling Agent Communication
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
Comparative analysis of machine learning models for fake news detection in so...
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
Enhancing plagiarism detection using data pre-processing and machine learning...
A symptom-driven medical diagnosis support model based on machine learning te...
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
MuleSoft-Compete-Deck for midddleware integrations

Lockpicking Baltic Cyber Security Forum 2013