Bypass: Difference between revisions

From Lockwiki
Jump to navigationJump to search
mNo edit summary
Line 1: Line 1:
=Bypass=
=Bypass=


A bypass occurs when a [[Lock|lock]] is compromised without the intended authentication, usually a [[Key|key]] or [[Combination|combination]]. Often, a bypass occurs when the lock's [[Latch|latch]] or [[Bolt|bolt]] are retracted without the turning of the cylinder, for example by [[Loiding|loiding]]. Bypass takes many forms, and can be either [[Non-destructive_Entry|non-destructive]] or [[Destructive_Entry|destructive]], with non-destructive methods being [[Covert_Entry|covert]] or sometimes [[Surreptitious_Entry|surreptitious]].
A bypass occurs when a [[Lock|lock]] is compromised without the intended authentication, usually a [[Key|key]] or [[Combination|combination]]. Often, a bypass occurs when the [[Latch|latch]] or [[Bolt|bolt]] are retracted without the turning of the cylinder. Bypass takes many forms, and can be either [[Non-destructive_Entry|non-destructive]] or [[Destructive_Entry|destructive]], with non-destructive methods being [[Covert_Entry|covert]] or [[Surreptitious_Entry|surreptitious]].


==Methods of Bypass==
==Methods of Bypass==
Line 14: Line 14:


;Locking Bolt Attacks
;Locking Bolt Attacks
:Flaws in the design or installation of the locking bolt may allow the bolt to be retracted without using the correct key or picking the lock cylinder. The classic credit-card opening of doors and slim jim on cars are two popular examples.
:Flaws in the design or installation of the locking bolt may allow the bolt to be retracted without using the correct key or picking the lock cylinder. The classic credit-card opening of doors (known as loiding) and slim jim on cars are two popular examples.


[[Category:Covert Entry]]
[[Category:Covert Entry]]

Revision as of 06:22, 13 January 2009

Bypass

A bypass occurs when a lock is compromised without the intended authentication, usually a key or combination. Often, a bypass occurs when the latch or bolt are retracted without the turning of the cylinder. Bypass takes many forms, and can be either non-destructive or destructive, with non-destructive methods being covert or surreptitious.

Methods of Bypass

There are few generic methods of bypass for lock cylinders; techniques are specific to design or installation flaws present in certain locks.

Padlock Shimming
Padlock shimming is perhaps the most ubiquitous method of bypass. It involves taking a small piece of metal and separating the locking bolt from the shackle in a padlock. Many low to medium security padlocks are vulnerable to this technique. Shims are available commercially, but can be made quickly with aluminum cans or, surprisingly, sufficiently strong paper.
Lock Actuator Attacks
Flaws in the design and placement of the locking actuator for the cylinder may allow a bypass tool to retract the locking bolt without the proper key inserted, or even internal components being in the proper positions. Various lock manufacturers have suffered from this vulnerability in the past.
Locking Bolt Attacks
Flaws in the design or installation of the locking bolt may allow the bolt to be retracted without using the correct key or picking the lock cylinder. The classic credit-card opening of doors (known as loiding) and slim jim on cars are two popular examples.