TryHackMe: Physical Security Intro Room Writeup

TASK 1: Introduction

  1. Watch the above videos
    https://www.youtube.com/watch?v=sw94smSiJBY&feature=emb_logo
    https://www.youtube.com/watch?v=rnmcRTnTNC8&feature=emb_logo

TASK 2:Overt, Covert, and Surreptitious Entry

Learn the different methods of entry

  1. Covert
  2. Surreptitious

TASK 3: Lock Picking

  1. What is the name of the tool which is used to apply torque to the core of a lock when picking?
    Tension Wrench
  2. What is the term used for picking a single pin at a time?
    Single Pin Picking
  3. What is the abbreviation commonly used to reference the above answer?
    SPP
  4. What is the term used when you try to randomly set pins?
    Raking
  5. This type of lock is typically cheap, low quality, and found on low security applications such as office desk cabinets.
    Wafer Lock
  6. This type of pick profile is usually used when single pin picking.
    Hook
  7. When single pin picking, this term refers to when you feel like you have set a pin and the core rotates slightly
    False Set
  8. This type of security driver pin gives several clicks as it is being picked.
    Serrated

TASK 4: Lock Anatomy

  1. What is the interface between the two pins in a pin stack referred to as?
    Shear Line
  2. What are the pins on the bottom half of a pin stack referred to as? (you don’t have to enter the word pin in the answer)
    Key
  3. What are the pins on the top half of a pin stack referred to as? (you don’t have to enter the word pin in the answer)
    Driver
  4. What non-shimmable elements do padlocks use to keep the shackle in place?
    Ball Bearings
  5. What is the piece that allows locking lugs to retract when the core is turned?
    Actuator
  6. What piece of a standard door latch should remain completely depressed when the door is closed to prevent loiding/slipping of the latch?
    Dead latch
  7. What is the locking mechanism that has a bolt which protrudes into the frame of the door preventing it from opening?
    Deadbolt

TASK 5: Padlock Bypassing

  1. A lock which is unshielded is susceptible to what bypass tool?
    Knife
  2. A lock which has spring loaded locking lugs rather than ball bearings can be bypassed with what tool?
    Shim
  3. Combination locks such as the Masterlock 5400D are susceptible to a bypass which reveals the combination What is this method known as?
    Decoding
  4. The Masterlock 175 is infamous for its ability to be bypassed using what type of bypass?
    Mini Knife
  5. What bypass method uses a key cut to the lowest depths and kinetic energy to bounce the driver pins above the shear line and allow a lock to be opened?
    Bumping
  6. Locks which have spring loaded locking lugs can be opened by tapping a hammer on the side of the lock. What is this attack method called?
    Rapping
  7. What type of pick takes advantage of lazy manufacturing practices by lifting all the key pins and driver pins above the shear line to bypass a lock?
    Comb
  8. What tools can be wiggled inside the keyway of wafer locks to roughly simulate the biting of the key and open the lock?
    Jiggler

TASK 6: Hardware Bypassing

  1. What tool is used to reach under a door and actuate a handle from the interior?
    Under The Door Tool
  2. What tool can be used to bypass a set of double doors which have a crash bar on the secure side?
    Double Door Tool
  3. What item can be used to widen the gaps between doors and door frames or between double doors to allow for other bypass tools to be used? This tool is also common for automobile entry.
    Air Wedge
  4. An improperly hung door which opens away from you can be bypassed using this type of tool?
    Shim
  5. An improperly hung door which opens away from you can be bypassed using this type of tool?
    traveler hook
  6. What type of material can be used to go over the door to grab the secure side handles when an under the door tool is not able to be used?
    Film
  7. Canned air can be used to bypass what type of door controller hardware?
    REX sensor
  8. Adams Rite hardware fixtures are susceptible to a bypass where a wire is snaked through the keyway and actuates the locking mechanism behind it, what could prevent this bypass?
    shielding

TASK 7: Credits and More Resources

First and foremost I need to give massive credit to TheNotSoCivilEngr. He is the co-author of this room. You definatly need to check out his YouTube channel for more physical security information: https://www.youtube.com/user/amihirata

Hacker || Student || CTF Player || Coder || Editor at A&M Publications

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store