Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

DEF CON 18 - BONUS- BLACK HAT- Barnaby Jack - Jackpotting Automated Teller Machines Redux

Автор: DEFCONConference

Загружено: 2013-11-08

Просмотров: 13825

Описание:

BONUS- BLACK HAT- Barnaby Jack - Jackpotting Automated Teller Machines Redux - Video

BONUS- BLACK HAT Presentation.
The presentation "Jackpotting Automated Teller Machines" was originally on the schedule at Black Hat USA 2009. Due to circumstances beyond my control, the talk was pulled at the last minute. The upside to this is that there has been an additional year to research ATM attacks, and I'm armed with a whole new bag of tricks.

I've always liked the scene in Terminator 2 where John Connor walks up to an ATM, interfaces his Atari to the card reader and retrieves cash from the machine. I think I've got that kid beat.

The most prevalent attacks on Automated Teller Machines typically involve the use of card skimmers, or the physical theft of the machines themselves. Rarely do we see any targeted attacks on the underlying software.

Last year, there was one ATM; this year, I'm doubling down and bringing two new model ATMs from two major vendors. I will demonstrate both local and remote attacks, and I will reveal a multi-platform ATM rootkit. Finally, I will discuss protection mechanisms that ATM manufacturers can implement to safeguard against these attacks.

Barnaby Jack is the Director of Research at IOActive Labs, where he focuses on exploring new and emerging threats, and recommending areas in which to concentrate IOActive's research efforts.

Jack has over 10 years experience in the security research space and previously held research positions at Juniper Networks, eEye digital Security, and FoundStone. Over the course of his career, Jack has targeted everything from low-level Windows drivers to the exploitation of Automated Teller Machines. He has subsequently been credited with the discovery of numerous vulnerabilities, and has published multiple papers on new exploitation methods and techniques.

For copies of the slides and additional materials please see the DEF CON 18 Archive here: https://defcon.org/html/links/dc-arch...

DEF CON 18 - BONUS- BLACK HAT- Barnaby Jack - Jackpotting Automated Teller Machines Redux

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

DEF CON 29 - Roy Davis - No Key  No PIN  No Combo  No Problem Pwning ATMs For Fun and Profit

DEF CON 29 - Roy Davis - No Key No PIN No Combo No Problem Pwning ATMs For Fun and Profit

Jmaxxz - Your Car is My Car -  DEF CON 27 Conference

Jmaxxz - Your Car is My Car - DEF CON 27 Conference

Marcell Molnár - Hacking ATMs on a Budget

Marcell Molnár - Hacking ATMs on a Budget

Cash Out Money With ATM Malware | ATM JACKPOTTING PROCESS

Cash Out Money With ATM Malware | ATM JACKPOTTING PROCESS

DEF CON 18 - Chris Paget - Practical Cellphone Spying

DEF CON 18 - Chris Paget - Practical Cellphone Spying

37C3 -  Breaking

37C3 - Breaking "DRM" in Polish trains

DEF CON Safe Mode - Trey Keown and Brenda So - Applied Cash Eviction through ATM Exploitation

DEF CON Safe Mode - Trey Keown and Brenda So - Applied Cash Eviction through ATM Exploitation

Jackpotting ATM's (Automated Teller Machines) - Its easier than you might think - Alexander Forbes

Jackpotting ATM's (Automated Teller Machines) - Its easier than you might think - Alexander Forbes

Скрытый шпион вашего компьютера с Windows 11: тёмная правда о чипах TPM

Скрытый шпион вашего компьютера с Windows 11: тёмная правда о чипах TPM

DEF CON 31 - Infinite Money Glitch - Hacking Transit Cards -  Bertocchi, Campbell, Gibson, Harris

DEF CON 31 - Infinite Money Glitch - Hacking Transit Cards - Bertocchi, Campbell, Gibson, Harris

LLM и GPT - как работают большие языковые модели? Визуальное введение в трансформеры

LLM и GPT - как работают большие языковые модели? Визуальное введение в трансформеры

Я войду сам: тактика физических тестировщиков

Я войду сам: тактика физических тестировщиков

Станислав Белковский*: Персонально ваш / 11.12.25 @BelkovskiyS

Станислав Белковский*: Персонально ваш / 11.12.25 @BelkovskiyS

Defcon 21 - All Your RFz Are Belong to Me - Hacking the Wireless World with Software Defined Radio

Defcon 21 - All Your RFz Are Belong to Me - Hacking the Wireless World with Software Defined Radio

Dark Web РАСКРЫТ (БЕСПЛАТНО + Инструмент с открытым исходным кодом)

Dark Web РАСКРЫТ (БЕСПЛАТНО + Инструмент с открытым исходным кодом)

everything is open source if you know reverse engineering (hack with me!)

everything is open source if you know reverse engineering (hack with me!)

DEF CON 24 - Weston Hecker - Hacking Hotel Keys and Point of Sale Systems

DEF CON 24 - Weston Hecker - Hacking Hotel Keys and Point of Sale Systems

DEF CON 22 - Gene Bransfield - Weaponizing Your Pets: The War Kitteh and the Denial of Service Dog

DEF CON 22 - Gene Bransfield - Weaponizing Your Pets: The War Kitteh and the Denial of Service Dog

КАК УСТРОЕН TCP/IP?

КАК УСТРОЕН TCP/IP?

DEFCON 19: Steal Everything, Kill Everyone, Cause Total Financial Ruin! (w speaker)

DEFCON 19: Steal Everything, Kill Everyone, Cause Total Financial Ruin! (w speaker)

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]