Urgences 24 sur 7 – (888) 287-5858   Connexion au Portail TitanSupport    Contactez-nous      Blogue

Key in DoorFor most people, keys are simple yet magical objects: They grant access to places you belong and keep you out of places you don’t. But did you know that anyone could easily make a copy of a key from a simple picture? Suddenly, something as ordinary as a key becomes a security risk. Through the eyes of a penetration tester, keys represent more than just access; they are vulnerabilities waiting to be exploited.

In today’s blog, we will explain how a malicious actor could physically intrude one of your offices undetected and how you should protect yourself against this unexpected attack vector. The same process could also be used by one of our Ethical Hacking security experts during a physical assessment. More details on this towards the end of the article.

Step 1: OSINT

The first step is to find a picture of a key. A malicious actor would typically look for pictures on the company website and on social media, like Facebook, Twitter, LinkedIn or even YouTube.  As we have seen numerous times in the past, people love to post pictures of their keys when they just signed a lease or a mortgage. Keys can also often be found in the background or attached to a belt or a lanyard. Finding pictures like this is, unfortunately, very easy.

In this example, the business had their front door keys shown in a B-roll during the opening of a news report they were interviewed in.

News Story Key

Figure 1. News report clip showing a key being inserted into a lock.

Step 2: Decoding

Once a picture of a key is found, the second step is to identify and decode the key. Decoding a key means measuring the height distance of each “valley,” which are the cuts made to a key, and extracting the corresponding bitting code by looking at the measurement chart applicable to the key. For a typical key, we normally have 5 or 6 positions to look for, which will result in a bitting code of 5 or 6 digits.


Figure 2. Key Close-up Clearly Showcasing 5 Positions.

In this example, the key is an SC1 from Schlage, which is a very common key in North America. Once we have found the measurement chart for SC1 keys, we can start decoding the key. We could also have used one of the several tools found online to help us with the decoding process.


Figure 3. SC1 Key with Decoding Chart Overlayed.

Using the chart, we can decode the key, from bow to tip (right to left in this picture), which yields the code 6-5-4-1-4.

Step 3: Cutting

Once the bitting code is obtained, we can cut the key. We could do it ourselves with a key blank, a file and a caliper. We could also try to 3D print the key ourselves by using one of the several key generator tools. Or, we could simply walk into a locksmith shop and ask them to produce the key instead.

In our example, this is what we decided to do, as it is the simplest and most reliable method. So, we went to visit our local locksmith and left with a freshly cut key ready to be used!

KEYBLOGFIG4

Figure 4. Snazzy New Key!

Step 4: Intruding

Once the new key has been cut, the fourth and last step is to use the key! Our malicious actor is now ready to intrude into the office at a moment’s notice. And since the malicious actor has the key, who will question their presence?

In our example, we tried the newly cut key with the presence of the business owner, which successfully demonstrated this attack vector.

Figure 5. Video clip successfully demonstrating the working key.

Conclusion

You now understand how easy it is to make a copy of a key. If you had one thing that you should remember from this blog post: Do not share pictures keys online! After all, keys are like passwords: They should never be shared with anyone!

Are you worried now that you know how easy it is to copy a key? Our Ethical Hacking team can help you evaluate the physical security posture of your business. Whether you have a store, an office, a warehouse, in one or more locations, our team can help you draw a detailed picture of your current situation and make recommendations that will allow you to improve your security posture. Contact us today!

Author: Patricia Gagnon-Renaud

Détection et réponse gérées et étendues GoSecure TitanMC (MXDR)

Détection et réponse gérées et étendues GoSecure TitanMC (MXDR) Fondation

Gestion des vulnérabilités en tant que service GoSecure TitanMC (VMaaS)

Surveillance des événements liés aux informations de sécurité gérée GoSecure TitanMC (SIEM gérée)

Défense du périmètre gérée GoSecure TitanMC (pare-feu)

Détection et réponse des boîtes de messagerie GoSecure TitanMC (IDR)

Passerelle de messagerie sécurisée GoSecure TitanMC (SEG)

Modélisateur de menaces GoSecure TitanMC

Identity GoSecure TitanMC

Plateforme GoSecure TitanMC

Services de sécurité professionnels de GoSecure

Services de réponse aux incidents

Évaluation de la maturité de la sécurité

Services de confidentialité

Services PCI DSS

Services de piratage éthique

Opérations de sécurité

MicrosoftLogo

GoSecure MXDR pour Microsoft

Visibilité et réponse complètes au sein de votre environnement de sécurité Microsoft

CAS D'UTILISATION

Cyberrisques

Mesures de sécurité basées sur les risques

Sociétés de financement par capitaux propres

Prendre des décisions éclairées

Sécurité des données sensibles

Protéger les informations sensibles

Conformité en matière de cybersécurité

Respecter les obligations réglementaires

Cyberassurance

Une stratégie précieuse de gestion des risques

Rançongiciels

Combattre les rançongiciels grâce à une sécurité innovante

Attaques de type « zero-day »

Arrêter les exploits de type « zero-day » grâce à une protection avancée

Consolider, évoluer et prospérer

Prenez de l'avance et gagnez la course avec la Plateforme GoSecure TitanMC.

24/7 MXDR

Détection et réponse sur les terminaux GoSecure TitanMC (EDR)

Antivirus de nouvelle génération GoSecure TitanMC (NGAV)

Surveillance des événements liés aux informations de sécurité GoSecure TitanMC (SIEM)

Détection et réponse des boîtes de messagerie GoSecure TitanMC (IDR)

Intelligence GoSecure TitanMC

Notre SOC

Défense proactive, 24h/24, 7j/7

À PROPOS DE GOSECURE

GoSecure est un leader et un innovateur reconnu en matière de cybersécurité, pionnier de l'intégration de la détection des menaces au niveau des terminaux, du réseau et des courriels en un seul service de détection et réponse gérées et étendues (MXDR). Depuis plus de 20 ans, GoSecure aide ses clients à mieux comprendre leurs failles en matière de sécurité et à améliorer leurs risques organisationnels ainsi que leur maturité en matière de sécurité grâce aux solutions MXDR et aux services professionnels fournis par l'une des équipes les plus fiables et les plus compétentes de l'industrie.

CALENDRIER D’ÉVÉNEMENTS

DERNIER COMMUNIQUÉ DE PRESSE

BLOGUE GOSECURE

AVIS DE SÉCURITÉ

Urgences 24 sur 7 – (888) 287-5858