This Sargent & Greenleaf mechanical combination lock package includes a model lock body, a D dial, and a R dial ring. The black and white dial is front reading with a spindle. The Combi-Cam E retrofits any cabinet lock application without permanent, further cutouts required to make the lock fit. $ Avea RFID Proximity Stand Alone Access Control System Self contained and no PC required. Features include variable open time for locking and request to exit. Can accept up to cards or fobs.
Major Mfg. Locks View All. Choose Options. Quick view. Kaba-Mas has announced that the color of all X models will change from gray to black. We no longer have these locks with a wargent finish. X High Security Lock. Add to Cart. The black and white dial is front reading with a spindle Used and acclaimed by locksmiths and builders alike, the Souber DBB Door Lock Morticer has proven itself to be an invaluable tool for anyone who installs mortice locks.
This clever jig cuts a These magnetic signs are commonly used on GSA Containers. They can be used on safes or file cabinets in Provides superior holding power, weighs less, and has a smaller footprint compared to other magnetic drill how to get audio files from youtube Out of stock.
A truly useful tool that no locksmith should be without. The Shrum tool, also known as a Travelers Saegent or a Carolina Roller, features a rugged handle and a 1. This product is a keypad only and must be coupled with an appropriate lock body to function.
The TopLit keypad allows easy code entry in dimly lit areas and reliable access to safe at night Each are interchangeable. Used by Safe Technicians for years, StrongArm carbide tipped drill bits are by far the most popular bits for drilling hard steel in safes. Weiser shim for lock picking and bypass.
Their machine, built to open a Sargent and Greenleaf lock on a Diebold Safe, found an unknown combination in 21, tries. Lockmasters, Inc. markets one autodialing machine [QX3 Combi Autodialer (LKMCOMBI)] that work on a variety of 3 and 4 Wheel combination safe locks. Jul 26, · A perfect example of a safe that allows you to use a change key is the Sargent & Greenleaf B. If the name ‘Sargent & Greenleaf’ sounds familiar, it’s because they feature prominently on Ralph’s list of best padlocks of all time. For this safe, you can insert the change key in the back of the safe and then you have to input the.
Safe-cracking is the process of opening a safe without either the combination or the key. Different procedures may be used to crack a safe, depending on its construction. Different procedures are required to open different safes so safe-crackers need to be aware of the differences. Lock manipulation is a damage-free combination recovery method, and a well known surreptitious bypass technique. Manipulation only requires fingers, eyes, and proper technique, though it is a skill that takes years to develop.
While manipulation of combination locks is usually performed on Group 2 locks, many Group 1 locks are susceptible to manipulation. It involves the manipulation of the lock in order to obtain the combination one number at a time. Similar damage-free bypass can also be completed by a computerized auto-dialer or manipulation robot.
These auto-dialer machines may take 24 hours or more to reach the correct combination,  although modern devices with enhanced advanced software may successfully do this more quickly.
Mechanical safe locks are manipulated primarily by feel and vision, with sound helping the process occasionally. To find the combination the operator uses the lock against itself by measuring internal movements with the dial numbers.
More sophisticated locks use advanced mechanics to reduce any feedback a technician could use to identify a combination. These group 1  locks were developed in response to group 2  lock manipulation.
A novice's opening time will be governed by these random inconsistencies, while some leading champions of this art show admirable consistency. There are also a number of tools on the market to assist safe engineers in manipulating a combination lock open in the field.
Nearly all combination locks allow some "slop" while entering a combination on the dial. This drastically reduces the time required to exhaust the number of meaningful combinations. A further reduction in solving time is obtained by trying all possible settings for the last wheel for a given setting of the first wheels before nudging the next-to-last wheel to its next meaningful setting, instead of zeroing the lock each time with a number of turns in one direction.
Safes may be compromised surprisingly often by simply guessing the combination. This results from the fact that manufactured safes often come with a manufacturer-set combination. These combinations known as try-out combinations are designed to allow owners initial access to the safes so that they may set their own new combinations.
Sources exist which list manufacturers' try-out combinations. Combinations are also unwittingly compromised by the owners of the safes by having the locks set to easy-to-guess combinations such as a birthdate, street address, or driver's license number.
A number of companies and groups have developed autodialing machines to open safes. Unlike fictional machines that can open any combination in a matter of seconds, such machines are usually specific to a particular type of lock and must cycle through thousands of combinations to open a device. A good example of such a device is a project completed by two students from the Massachusetts Institute of Technology , Kyle Vogt and Grant Jordan.
Their machine, built to open a Sargent and Greenleaf lock on a Diebold Safe, found an unknown combination in 21, tries. Lockmasters, Inc. There also exist computer-aided manipulation tools such as Mas Hamilton's SoftDrill no longer in production. These tools are similar to autodialers, except they make measurements of the internal components of the lock, and deduce the combination in a similar way to that of a human safe technician.
While some safes are hard to open, some are susceptible to compromise by drilling or other physical methods. Manufacturers publish drill-point diagrams for specific models of safes. These are tightly guarded by both the manufacturers and locksmithing professionals. Drilling is usually aimed at gaining access to the safe by observation or bypass of the locking mechanism. Drilling is the most common method used by locksmiths, and is commonly used in cases of burglary attempts, malfunctioning locks or damaged locks.
In observational attacks, the drill hole allows the safecracker to view the internal state of the combination lock. Drill-points are often located close to the axis of the dial on the combination lock, but observation may sometimes require drilling through the top, sides or rear of the safe. While observing the lock, the locksmith manipulates the dial to align the lock gates so that the fence falls and the bolt is disengaged.
Bypass attacks involve physical manipulation of the bolt mechanism directly, bypassing the combination lock. All but the simplest safes are designed to protect against drilling attacks through the implementation of hardplate steel extremely wear-resistant or composite hardplate a casting of metal such as cobalt-vanadium alloys with embedded tungsten carbide chips designed to shatter the cutting tips of a drill bit within the safe, protecting the locking mechanism and other critical areas such as the locking bolts.
The use of hardplate ensures that conventional drilling is not successful when used against the safe. Drilling through hardplate requires the use of special-purpose diamond or tungsten-carbide drill-bits. Even then, this can be a time-consuming and difficult process with safes equipped with modern composite hardplates. Some high- security safes use a glass relocker. This is a piece of tempered glass mounted between the safe door and the combination lock.
It has wires attached to the edges. These wires lead to randomly located, spring-loaded bolts. If an attempt is made to penetrate the safe, the penetrating drill or torch could break the glass and release the bolts. These bolts block the retraction of the main locking bolts. To drill a safe with a glass relocker, side, top, or rear drilling may be necessary.
A gas abrasive drill can sometimes be used to drill through a glass relocker without triggering it. Many modern high-security safes also incorporate thermal relockers in conjunction with glass-based relockers usually a fusible link as part of the relocker cabling , which also activate when the temperature of a safe exceeds a certain level as a defense against torches and thermal lances. Drilling is an attractive method of safecracking for locksmiths, as it is usually quicker than manipulation, and drilled safes can generally be repaired and returned to service.
Punching, peeling and using a torch are other methods of compromising a safe. The punch system is widely used by criminals for rapid entry. Peeling is a method that involves removing the outer skin of the safe. Scoping a safe is the process of drilling a hole and inserting a borescope into the safe to get an intimate look into a specific part of the security container. When manipulation proof mechanical locks and glass re-lockers are implemented as security measures, scoping is the most practical option.
One common method is called "scoping the change key hole. While spinning the dial and looking through the change key hole for certain landmarks on the combination lock's wheel pack, it is possible to obtain the combination and then dial open the safe with the correct combination. This method is common for a professional safe specialist because it leaves the lock in good working order and only simple repairs are needed to bring the safe barrier back to its original condition.
It is also a common way to bypass difficult hard plates and glass re-lockers since the change key hole can be scoped by drilling the top, side, or back of the container. Other methods of cracking a safe generally involve damaging the safe so that it is no longer functional. These methods may involve explosives or other devices to inflict severe force and damage the safe so it may be opened.
Examples of penetration tools include acetylene torches , drills, and thermal lances. This method requires care as the contents of the safe may be damaged. Safe-crackers can use what are known as jam shots to blow off the safe's doors.
Most modern safes are fitted with 'relockers' like the one described above which are triggered by excessive force and will then lock the safe semi-permanently a safe whose relocker has tripped must then be forced, the combination or key alone will no longer suffice.
This is why a professional safe-technician will use manipulation rather than brute force to open a safe so they do not risk releasing the relocker.
Penetrating radiation such as X-ray radiation can be used to reveal the internal angular relationship of the wheels gates to the flys mechanism to deduce the combination. Some modern safe locks are made of lightweight materials such as nylon to inhibit this technique, since most safe exteriors are made of much denser metals.
The Chubb Manifoil Mk4 combination lock contains a lead shield surrounding part of the lock to defeat such attempts to read its wheels. Large bank vaults which are often located underground have been compromised by safe-crackers who have tunneled in using digging equipment. This method of safe-cracking has been countered by building patrol-passages around the underground vaults. These patrol-passages allow early detection of any attempts to tunnel into a vault.
Many cheap safes use a magnetic locking pin to prevent lateral movement of an internal locking bolt, and use a solenoid to move the pin when the correct code is entered. This pin can also be moved by the impact of the safe being dropped or struck while on its side, which allows the safe to be opened. More expensive safes use a gear mechanism that is less susceptible to mechanical attacks. Low-end home and hotel safes often utilize a solenoid as the locking device and can often be opened using a powerful rare-earth magnet.
Electronic locks are not vulnerable to traditional manipulation techniques. These locks are often compromised through power analysis attacks. Tools like these are often connected to wires in the lock that can be accessed without causing damage to the lock or container. Nearly all high-end, consumer-grade electronic locks are vulnerable to some form of electronic attack.
The combinations for some electronic locks can be retrieved by examining electromagnetic emissions coming from the lock. Low-end electronic fire-safes, such as those used in hotels or for home use, are locked with either a small motor or a solenoid. If the wires running to the device solenoid or motor can be accessed, the device can be 'spiked' with a voltage from an external source - typically a 9 volt battery - to open the container.
If an electronic lock accepts user input from a keypad , this process can be observed in order to reveal the combination. Common attacks include:. Many of these techniques require the attacker to tamper with the keypad, wait for the unsuspecting user to enter the combination, and return at a later time to retrieve the information.
These techniques are sometimes used by members of intelligence or law enforcement agencies, as they are often effective and surreptitious. Some keypads are designed to inhibit the aforementioned attacks. This is usually accomplished by restricting the viewing angle of the keypad either by using a mechanical shroud or special buttons , or randomizing the positions of the buttons each time a combination is entered.
This allows for randomization of the button positions, which is normally performed each time the keypad is powered on. The buttons usually contain a lenticular screen in front of the display, which inhibits off-axis viewing of the numbers. When properly implemented, these keypads make the " shoulder surfing " attack infeasible, as the combination bears no resemblance to the positions of the keys which are pressed.
Movies often depict a safe-cracker determining the combination of a safe lock using his fingers or a sensitive listening device to determine the combination of a rotary combination lock.
Other films also depict an elaborate scheme of explosives and other devices to open safes. Three safecracking methods seen in movies were also tested on the television show MythBusters , with some success.
The safe had also sprung many leaks.