Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

DEF CON 31 - Contactless Overflow Code Execution in Payment Terminals & ATMs - Josep Rodriguez

Автор: DEFCONConference

Загружено: 2023-09-16

Просмотров: 117399

Описание:

We conducted a research to assess the current security of NFC payment readers that are present in most of the major ATM brands, portable point of sales, gas stations, vending machines, transportation and other kind of point of sales in the US, Europe and worldwide. In particular, we found code execution vulnerabilities exploitable through NFC when handling a special application protocol data unit (APDU) that affect most NFC payment vendors. The vulnerabilities affect baremetal firmware devices and Android/Linux devices as well.

After waiting more than 1 year and a half once we disclosed it to all the affected vendors, we are ready to disclose all the technical details to the public. This research was covered in the media by wired.com but without the technical details that we can share now https://www.wired.com/story/atm-hack-...

Some of the affected vendors are: IDtech - https://idtechproducts.com/ Ingenico - https://www.ingenico.com/ Verifone - https://www.verifone.com/ CPI - https://www.cranepi.com/ BBPOS - https://www.bbpos.com/ Wiseasy - https://www.wiseasy.com/ Nexgo - https://www.nexgoglobal.com/

In this presentation we will describe the vulnerabilities and also demo how the readers can be compromised, using a special Android app we created, by just tapping an Android phone to the reader. We will discuss the consequences such as financial impact in reader’s users/owners and card data stealing once the firmware is compromised. Also, we will show how to compromise the host that is connected to the reader through USB by manipulating the reader’s firmware, chaining stack buffer overflow vulnerabilities in the SDK provided by the vendor that is running in the host machine.

Finally, since one of the affected vendors (IDtech) is present in most ATM brands in the world, the talk will cover different scenarios of how possible can be jackpotting ATMs just tapping a smartphone into the reader of the ATM. We have many years of experience jackpotting all brands of ATMs in multiple different ways and we will show how this is technically possible.

DEF CON 31 - Contactless Overflow Code Execution in Payment Terminals & ATMs - Josep Rodriguez

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

DEF CON 31 - How Vulns in Global Transportation Payment Systems Cost You - Omer Attias

DEF CON 31 - How Vulns in Global Transportation Payment Systems Cost You - Omer Attias

DEF CON 31 - Warshopping- Phreaking Smart Shopping Cart Wheels Through RF Sniffing - Joseph Gabay

DEF CON 31 - Warshopping- Phreaking Smart Shopping Cart Wheels Through RF Sniffing - Joseph Gabay

ThinkNode M1: Первый взгляд и разборка (E-Ink + GPS) #meshtastic

ThinkNode M1: Первый взгляд и разборка (E-Ink + GPS) #meshtastic

Правда о клонировании SIM-карт

Правда о клонировании SIM-карт

17 Hacker Tools in 7 Minutes - ALL Hak5 Gear

17 Hacker Tools in 7 Minutes - ALL Hak5 Gear

Is this the best FPGA for Beginners? | Tang Nano

Is this the best FPGA for Beginners? | Tang Nano

DEF CON 32 - From getting JTAG on the iPhone 15 to hacking Apple's USB-C Controller - Stacksmashing

DEF CON 32 - From getting JTAG on the iPhone 15 to hacking Apple's USB-C Controller - Stacksmashing

DEF CON 29 - Roy Davis - No Key  No PIN  No Combo  No Problem Pwning ATMs For Fun and Profit

DEF CON 29 - Roy Davis - No Key No PIN No Combo No Problem Pwning ATMs For Fun and Profit

Взлом Bitlocker — обход шифрования диска Windows

Взлом Bitlocker — обход шифрования диска Windows

DEF CON 31 - Using SIM Tunneling to Travel at Light Speed -  Adrian Dabrowski, Gabriel Gegenhuber

DEF CON 31 - Using SIM Tunneling to Travel at Light Speed - Adrian Dabrowski, Gabriel Gegenhuber

DEF CON 31 - Defender Pretender  When Windows Defender Updates Become a Security Risk  -Bar, Attias

DEF CON 31 - Defender Pretender When Windows Defender Updates Become a Security Risk -Bar, Attias

DEF CON 31 - Infinite Money Glitch - Hacking Transit Cards -  Bertocchi, Campbell, Gibson, Harris

DEF CON 31 - Infinite Money Glitch - Hacking Transit Cards - Bertocchi, Campbell, Gibson, Harris

Это лучший инструмент OSINT?!

Это лучший инструмент OSINT?!

Hacker's Guide to UART Root Shells

Hacker's Guide to UART Root Shells

465 Университет Ратгерса подтвердил: Meshtastic и LoRa опасны

465 Университет Ратгерса подтвердил: Meshtastic и LoRa опасны

Взлом мобильных телефонов в стиле Мистера Робота

Взлом мобильных телефонов в стиле Мистера Робота

How the Best Hackers Learn Their Craft

How the Best Hackers Learn Their Craft

DEF CON 31 — Физические атаки на смартфоны — Кристофер Уэйд

DEF CON 31 — Физические атаки на смартфоны — Кристофер Уэйд

DEF CON 31 - Vacuum Robot Security & Privacy Prevent yr Robot from Sucking Your Data -  Dennis Giese

DEF CON 31 - Vacuum Robot Security & Privacy Prevent yr Robot from Sucking Your Data - Dennis Giese

DEF CON 31 Car Hacking Village - Abusing CAN Bus Spec for DoS in Embedded Systems  - Martin Petran

DEF CON 31 Car Hacking Village - Abusing CAN Bus Spec for DoS in Embedded Systems - Martin Petran

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]