Book of the Month – Practical Lock Picking

This month we are reviewing one of the interesting book – “Practical Lock Picking –  Physical Penetration Tester’s Training Guide” . Written by the Deviant Ollam – expert in the ‘Lock Picking’ field – this book presents every aspect of the subject in concise and easy to understandable way.

.

.

Here is the core information about the book,

.

  • Title: Practical Lock Picking: A Physical Penetration Tester’s Training Guide
  • Author: Deviant Ollam
  • Publisher: Syngress 
  • Hardcover: 236 pages
  • Release Date: July 23, 2010
  • Print Book Price: $22.83 (as of this writing)
  • Kindle Edition Price: $21.22 (as of this writing)
  • Rating(Amazon):

.

Here is the table of contents

Chapter 1: Fundamentals of pin tumbler and wafer locks
Chapter 2: The basics of picking: Exploiting weaknesses
Chapter 3: Beginner training: How to get very good, very fast
Chapter 4: Advanced training: Learning some additional skills
Chapter 5: Quick-entry tricks: Shimming, bumping, and bypassing
Chapter 6: They all come tumbling down: Pin tumblers in other configurations
Appendix: Guide to tools and toolkits

.

As a typical pen tester you will generally focus on breaking the unauthorized access with your soft skills using tools like Metasploit, Backtrack, Nessus etc. However this book shows you how to break those physical barriers to get into the server room and play with it directly.

.

In the first chapter, author describes inner components of the most typical styles of locks in use today. So even if you are dumb like me on such things, this chapter will set you right.Second chapter is more interesting as it shows how to use the right tools and techniques for lock picking. After this probably you can open up one of those secret safe of your grandma :). Next chapter presents overview of the basic types of equipment that are particularly helpful when starting out with a study of lock picking.

Chapter 4 covers the advanced topics including lock picking of pick-resistant design locks with some specialized tools and great patience. As a pentester it is important to get things done quickly, easily and cleanly. Chapter 5 shows some of those quick bypassing techniques with handy tools. Final chapter takes you down through specialized stuff and author ends with a note ‘Practice, Practice, Practice’ – only this can make you master !

.

While reading this book, it will be difficult for you to sit calmly and go through it, you will be tempted to look for the locks around your house and start tinkering with it.

.
What makes this book easy to understand are the clear cut diagrams showing the internal design of locks. You will hardly find a page in this book without those design pictures and all of these are precise engineering-diagram types – not just some random lock pictures. It is very clear that author has taken great efforts to get those pictures right and this is what gives this book 5 star rank !

.

And finally when you are done with this book, your thoughts on Security of Locks will change forever !

.

No matter what you do for your living, this book presents great insights on “Lock Picking” which is an interesting thing for any curious human being !

.

[Highly Recommended]

eBook Link: http://www.filesonic.com/file/369800321/Practical_L0ck.rar

Similar posts
  • Advanced Malware Analysis Training Se... Here is the quick update on this month’s Local Security meet (SX/Null/G4H/owasp) and our advanced malware training session on (Part 2) Dissecting the HeartBeat  RAT Functionalities   This is part of our FREE ‘Advanced Malware Analysis Training’ series started from Dec 2012.       In this extended session, I explained “Decrypting various Communications Of HeartBeat [...]
  • Advanced Malware Analysis Training Se...   Here is the quick update on this month’s Local Security meet (SX/Null/G4H/owasp) and our advanced malware training session on (Part 1) Reversing & Decrypting Communications of HeartBeat RAT This is part of our FREE ‘Advanced Malware Analysis Training’ series started from Dec 2012.       In this extended session, I explained “Decrypting The [...]
  • Detailed Overview and Internals of PE... A win32 portable executable(PE) file consists of: DOS Header, PE Header, Section Table, Sections. Analyzing a PE file gives us a lot of information like the address in memory where the file will be located (ImageBase), address of entry point, imported and exported functions, packed or unpacked etc. Thus this static analysis can indicate whether [...]
  • SEH Exploitation to Get Shell Access   Structured Exception Handling is a mechanism for handling both hardware and software exceptions in Windows OS. Structured exception handling enables us to have complete control over the handling of exceptions and it also provides support for debuggers as well. SEH exploitation is based on stack buffer overflow technique. It becomes easy to exploit a [...]
  • Bamital Analysis using Malpimp and Py... A couple of months ago, I released my two new tools Malpimp and PyMal for malware analysis. Malpimp aims at API tracing and PyMal is a general purpose malware analysis tool. In this blog I will discuss how to use both of them in malware analysis. As a case study I am using Bamital botnet [...]

Leave a Reply

Our Company

Follow us on Facebook


Join Mailing List

Get direct access to our expert trainers or mingle with like minded security folks in our mailing list