Article 830J Ars puts new Master Lock hack to the test—and succeeds

Ars puts new Master Lock hack to the test—and succeeds

by
Nate Anderson
from Ars Technica - All content on (#830J)

Yesterday, our own Dan Goodin covered a clever new hack that uses a bit of calculation to reduce a well-known Master Lock exploit from 100 maximum attempts to just eight. Today, we put the hack to the test. Is cracking a Master Lock as simple as hacker Samy Kamkar makes it look if you have absolutely zero experience?

I bought a new Master Lock from a local drugstore last night and sat down with it this morning to see if I could pop it open without looking at the combination first. Using Samy's instructional video and a basic Web tool he designed, I timed my attempt at opening the lock.

The first few minutes seemed promising. I watched the video and began to replicate its instructions on the lock in my hands, but two of the steps proved trickier than they looked. The first and second "locked positions" were simple to find, but the third number I needed was a "resistant location" that was far more subtle. While I was supposed to note the one place where the lock caught each time as I spun the dial, it seemed to catch in multiple places even as I varied the pressure on the shackle. I took a guess and used the Web tool, which generated 16 possible lock combinations.

Read 7 remaining paragraphs | Comments

index?i=cklwuylFesU:MFxgaYB3Cv8:V_sGLiPB index?i=cklwuylFesU:MFxgaYB3Cv8:F7zBnMyn index?d=qj6IDK7rITs index?d=yIl2AUoC8zAcklwuylFesU
External Content
Source RSS or Atom Feed
Feed Location http://feeds.arstechnica.com/arstechnica/index
Feed Title Ars Technica - All content
Feed Link https://arstechnica.com/
Reply 0 comments