thewayne: (Cyranose)
The Wayne ([personal profile] thewayne) wrote2013-08-03 10:52 am
Entry tags:

Kwikset "Smartkey" locks vulnerable to some interesting attacks

Yet another DefCon demonstration. In this case, the lock is advertised as secure and flexible because it's easy for the owner to reprogram the lock for a house sitter or whatever, then change the lock back when they need to. It's not a digital lock, needs a key like most others. Two vulnerabilities are demonstrated in videos with this article. The first uses a piercing blade and a hammer, the blade is inserted in the keyway and the hammer whacks it until it pierces the thin metal of the back of the lock. A wire with a loop is then inserted to turn the tailpiece, the thing that actually engages as the lock. Once that's turned, the lock is unlocked and unless there's a very close physical inspection, you can't see that the lock is broken because your key still works in it.

There's another technique that's been around for years called Bumping, after you bump a lock any key will work in it and the lock is physically broken. This is different.

The second technique uses a screwdriver and a pair of pliers. The lock is supposedly rated to 300 pounds-force-inch of torque to turn the cylinder, turns out that it will turn with about a hundred.

Kwikset, of course, denies that these vulnerabilities exist.

http://www.wired.com/threatlevel/2013/08/kwikset-smarkey-lock-vulns/

Post a comment in response:

This account has disabled anonymous posting.
(will be screened if not validated)
If you don't have an account you can create one now.
HTML doesn't work in the subject.
More info about formatting

If you are unable to use this captcha for any reason, please contact us by email at support@dreamwidth.org