A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Breadcrumb Home Insights Source Zero Visual Lock Picking Workstation June 11, 2020 Visual Lock Picking Workstation The Visual Lock Picking Workstation is a Raspberry Pi enclosure which makes it possible to capture live video from a cutaway lock. It is intended as an instructional device which can be used to display the inner workings of a lock while teaching lock picking. The 3d model file is available on the Optiv Git repository. Required Components Raspberry Pi 3 Raspberry Pi Camera module Light ring for Raspberry Pi Camera (I suggest the Bright Pi) Cutaway lock core 3d printed enclosure Command line for displaying live video. This can also be added to a startup script so that it automatically starts every time the pi boots. Raspivid -t 0 -vf -w 1920 -h 1080 -fps 30 -rot 270 By: Douglas Rogahn Senior Security Consultant | Optiv Doug Rogahn is a Senior Security Consultant in Optiv’s Advisory Services practice on the Threat Management Team, delivering a variety of service offerings including web and mobile application assessments, architecture reviews and database security reviews. Doug’s role is to provide post-sales support and consulting to Optiv’s clients as well as providing support and mentoring to other Optiv team members. Doug has run the Lock Picking and Safe Cracking villages for Cypher Con and Milwaukee Hak4Kidz events for the last 4 years. He has volunteered at a number of lock picking villages and participated in lock picking competitions at Def Con and Derby Con. Share: Cybersecurity Enterprise Security Red Team Raspberry Pi Lockpicking Threat Source Zero® Copyright © 2024 Optiv Security Inc. All rights reserved. No license, express or implied, to any intellectual property or other content is granted or intended hereby. This blog is provided to you for information purposes only. While the information contained in this site has been obtained from sources believed to be reliable, Optiv disclaims all warranties as to the accuracy, completeness or adequacy of such information. Links to third party sites are provided for your convenience and do not constitute an endorsement by Optiv. These sites may not have the same privacy, security or accessibility standards. Complaints / questions should be directed to Legal@optiv.com
Copyright © 2024 Optiv Security Inc. All rights reserved. No license, express or implied, to any intellectual property or other content is granted or intended hereby. This blog is provided to you for information purposes only. While the information contained in this site has been obtained from sources believed to be reliable, Optiv disclaims all warranties as to the accuracy, completeness or adequacy of such information. Links to third party sites are provided for your convenience and do not constitute an endorsement by Optiv. These sites may not have the same privacy, security or accessibility standards. Complaints / questions should be directed to Legal@optiv.com
Would you like to speak to an advisor? How can we help you today? Image E-Book Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation Download Now Image Events Register for an Upcoming OptivCon Learn More Ready to speak to an Optiv expert to discuss your security needs?