This is the first of our Lock picking series. In this episode we describe how to make and use a bump key to quickly unlock most residential grade locks.
Search Hacking Mode Trick Updates
Subscribe to:
Post Comments (Atom)
Post Friends Link
CATEGORY
- aircrack (1)
- Airdecloak-ng (1)
- AiroWizard (1)
- Airtun-ng (1)
- Application Patching (1)
- Arpwatch (1)
- backtrack (23)
- Backtract DOWNLOAD (2)
- Beer Pong Table (2)
- Bluetooth (2)
- Cain (1)
- cracking (2)
- Download Airowizard Manual (1)
- Dual Boot (1)
- Easside-ng (1)
- Email Spoofing (1)
- Ettercap (1)
- Exploit Hacking (1)
- Fast-Track (1)
- Gateway (1)
- Generator (1)
- hacking (26)
- Hacking Basics (1)
- handphone (8)
- HUAWEI (1)
- Huawei EC506 (1)
- Injection (1)
- Intel Wireless Wi-Fi 5100 Card injection OK (2)
- Introduction (1)
- Local Password Cracking (1)
- Lock Picking (3)
- Lock Picking Basics (1)
- McAfee (1)
- Metasploit Autopwn (1)
- nokia (1)
- Packet Injection wifi Intel 4965 AGN (1)
- Packetforge-ng (1)
- Panen Password (1)
- Password (1)
- phising (1)
- phone hacking (3)
- Phone Phreaking (1)
- Recovering an Acer Computer (1)
- SIUC’s Network (1)
- Sniffing VoIP (1)
- Snipper (2)
- Spoonwep2 (1)
- Sql Injection (3)
- ssldump (1)
- Staying Secure - SSH Tunnel (1)
- t (1)
- TCP / IP (3)
- The 60 Minutes Effect (1)
- Tkiptun-ng (2)
- Tool Spoonwpa Wpa Key (1)
- trik (12)
- Triple Boot (1)
- tutorial (9)
- ubuntu (1)
- usb (2)
- USB Worm (Jamesgo.dll) (1)
- video (10)
- Website Hacking (2)
- Wesside-ng (1)
- Wi-Fi (9)
- windows (5)
- wireless (9)
- Wireless 3945ABG (2)
- WPA (1)
- WPA wireless encryption cracked (1)
- XSS Tunnel (1)
Archive
-
▼
2008
(105)
-
▼
December
(48)
- Wireless Hacking - Cracking WEP
- Wireless Hacking - DeAuth
- Lock Picking - Bump Key
- Phone Phreaking - Beige Box
- Phone Phreaking/Network Hacking - Sniffing VoIP
- Lock Picking - DIY Padlock Shims
- Lock Picking - Mult-Disc Combo Locks
- Local Privilege Escalation Vulnerability in Cisco ...
- Hacking Basics - MD5
- Website Hacking - Sql Injection
- Hacking Basics - Backtrack
- How to use Intel Pro/Wireless 3945ABG in Backtrack 2
- How to use Intel Pro/Wireless 3945ABG in Backtrack 2
- Sql Injection Challenge!
- Sql Injection Challenge How-to
- SIUC’s Network
- Infinity Exists Featured On 60 Minutes
- Website Hacking - XSS
- The 60 Minutes Effect
- Exploit Hacking
- USB Worm (Jamesgo.dll)
- Staying Secure - SSH Tunnel
- Wireless Hacking - Cracking WPA
- Singing Tesla Coil
- McAfee SiteAdvisor
- Tapping a 66 Block Telephone Network Interface
- Triple Boot - Windows, Backtrack, & Ubuntu
- Dual Boot - Windows & Backtrack
- Local Password Cracking
- Introduction
- Lock Picking Basics
- Email Spoofing
- Metasploit Autopwn
- Recovering an Acer Computer
- Application Patching
- Ettercap
- Windows SMB Relay Exploit
- Beer Pong Table
- Beer Pong Table
- XSS Tunnel
- Password Phishing
- Bypass Cisco Clean Access & Cisco NAC Appliance
- Manipulating Windows User Accounts
- Manipulating Windows User Accounts
- Episode 12 - Hacking Basics - Backtrack
- List of compatible adapters BackTrack
- Perintah untuk Hacking Wi Fi (BackTrack)
- Hacking tools: A new version of BackTrack helps et...
-
▼
December
(48)
1 comments:
A “999” or bump key can be any key that fits a particular pin tumbler lock and that has been modified so that all of its cuts are to the deepest allowable position, as defined by each manufacturer.It is a bypass method that uses a specially cut key to cause the pin tumblers to momentarily split across the shear line, thereby allowing the plug to turn.Any key for any apartment in this example could be modified to act as a bump key and then could be used to open any other apartment within the complex, and potentially other complexes where the same or similar manufacturer’s locks are utilized.Good information about lock picking .
Post a Comment