SlideShare a Scribd company logo
1 of 8
1
TECHNICAL GUIDELINES ON
How to Secure a POS System from
Hackers
By:
Syed Ubaid Ali Jafri
Information Security Professional
LinkedIn: https://pk.linkedin.com/in/ubaidjafri
2
Contents
Background..............................................................................................................................................................................................................3
Objective..................................................................................................................................................................................................................3
Testing Type .............................................................................................................................................................................................................3
TOP 15 Controls Checklist..........................................................................................................................................................................................4
POS Checklist............................................................................................................................................................................................................7
References................................................................................................................................................................................................................8
3
Background
The payment terminals we are talking about are tamper proof. They usually have Ethernet connectivity, and a serial line. The interface open to normal user is the card
slot and PIN pad, and in some occasions contactless reader. The actual configuration does vary between models and vendors, but the basic idea is that the terminal
initiates all the connections and doesn't listen to anything incoming.
Objective
Our objective for publishing this document is to ensure technically that the initial security up to a level where POS should be secure from basic attacks.
Testing Type
This testing involves the Physical layer to Presentation Layer testing which includes the following controls but not limited to
S.No Control Name
1 Insecure Physical Connectivity
2 IP/MAC Address Spoofing
3 Weak or Default credentials on Device
4 Insecure Communication Protocol
5 Unencrypted Data Travelling
6 Insecure Data Storage
7 Sensitive Information Disclosure
8 Shared File Enumeration
9 Stress testing of PoS Machine
10 Inadequate Transaction Handling
11 Un-necessary services/Ports open
12 Absence of Audit Logging
13 Missing Patches
14 SNMP public community string
15 SSL/TLS Configuration Weaknesses
4
TOP 15 Controls Checklist
Summary Sheet of Controls
S. No Control Name Control Description Severity Impact
1 Physical Connectivity of PoS
The Network connectivity of of PoS device
whether the device is connected with
Wireless Router or with LAN Switch. Ensure
that no other user is able to connect to the
same Wifi or LAN Network
High
An attacker or malicious user with local
network access is able to plug their
infected machine with the network
connected to a PoS system, An attacker
would be able to sniff or capture the data
on the network. An attacker can easily
perform a MiTM attack against this
connectivity,
2 IP/MAC Address Spoofing
A network attacker can use a protocol
analyzer to know a valid MAC address, By
examining the MAC Address, An Attacker is
able to spoofed the IP/MAC Address of the
POS Machine
High
An attacker can easily steal the identity of
the device, an attacker can perform the
malicious activity by showing the
legitimate device identity which doesn’t
belong to them.
3 Weak or Default credentials on Device
Device is using the default username or
password for hardware administration
High
An attacker or malicious user is able to
perform modification by using the default
credentials on device, an attacker is able
to change or modify the hardware
configurations on device.
4 Insecure Communication Protocol
Device is using the weak protocols (FTP,
Telnet, VNC, RDP) for remote administration
which could lead towards confidentiality,
intigrity , availability attack
High
An attacker or malicious user, with local
network access, is able to perform a Man-
in-the-Middle attack (MITM) and can see
all communication between the POS and
the FTP server on the. Using a username
and password obtained by passively
sniffing traffic on the network, the attacker
can connect to the FTP server, download,
modify, and then upload arbitrary files
5 Unencrypted Data Travelling
Device is able to send data unencrypted on
Wifi/LAN channel
High
An Attacker or malicious user, with local
network access, is able to perform a
sniffing attack on Wi-Fi/LAN Network.
Capturing the unencrypted traffic contains
the sensitive information of (Usernames,
Password, accounts information)
5
6 Insecure Data Storage
Device is able to store the data on Memory
card or in the device itself
High
An attacker is able to copy all the stored
data on the machine or in the memory
card, which could help an attacker to
generate the fake card of original values
stored in the device or memory card, by
using different strip card reader writer
machines.
7 Sensitive Information Disclosure
Device is capable to exposing the sensitive
data which contains (Track 1 record, Track 2
record and CVV Number of customer
High
An attacker is able to read or sniff the
Track-1, Track-2 Data of customer which
could impact towards fake card
generation or online sale purchasing of
goods.
8 Shared File Enumeration
Device has multiple open folders that are
shared and has access to the root directory
directly
High
This may directly lead to system
compromise by allowing modification of
system files.
9 Stress Testing of Pos Terminal
The device is not capable for handling huge
load on the network, the devices is able to
randomly shut down and restart ports on the
network switches/routers that connect the
servers (via SNMP commands for example),
double the baseline number for concurrent
users/HTTP connections
High
An attacker using less skills can perform
the attacker on the system which could
lead towards availability attack.
10 Inadequate Transaction Handling
An attacker is able to retrieve the
configuration information from the Server, the
authentication takes place in plaintext over
the local network, and all the transactions are
shown in plaintext in the text file.
High
An attacker can perform the Man-in-the-
Middle attack and can change the price
value, modify the items and their date.
11 Un-necessary services/Ports open
There are multiple ports that are open and not
being used on the device
Medium
By using unused port an attacker can
perform a brute force attack or sending
the SYN request to the terminal machine
which could lead towards availability
attack.
6
12 Absence of Audit Logging
Device is not able to record the logs of
(Logged in, Transactions, Network
Connectivity)
Medium
Due to absence of Audit Logging, An
attacker can easily perform malicious
activities and hide their tracks.
13 Missing Patches
Critical Microsoft security patches were not
installed on the PoS Sytem. The missing
patches address vulnerabilities which may
allow unauthenticated remote code execution,
privilege escalation, denial of service, and
confidential information disclosure
Medium
An attacker or malicious user with
network access may be able to view
sensitive information, cause Denial-of-
Service, or execute arbitrary code. An
attacker with local access to the hosts
may be able to escalate their privileges
up to the administrator level.
14 SNMP public community string
Simple Network Management Protocol
(SNMP) community string ‘public’ is used on
the PoS Machine, granting READ-ONLY
access to information on remote hosts. SNMP
is generally used for system and network
monitoring purposes. Typically, a remote
network management server queries a
remote SNMP agent (residing on the target
system) for system status, by supplying a
community string for authentication.
Medium
An attacker or malicious user is able to
use the default SNMP community string
to discover detailed device metadata and
network configuration details, which can
assist in other attacks. The information
disclosed includes the operating system
version, a list of users on the system, a
list of installed software, any enabled
network interfaces, routing information, as
well as any open TCP connections.
15 SSL/TLS Configuration Weaknesses
Secure Sockets Layer (SSL) and Transport
Layer Security (TLS) are used in the POS
environment to protect the confidentiality and
integrity of connections to database servers,
and to the administrative web interface of the
site router. We identified the following
misconfigurations with the implementation of
SSL/TLS.
Medium
An attacker or malicious user with
network access is able to impersonate
SSL/TLS-protected services, or carry out
Man-in-The-Middle attacks, compromising
the confidentiality and integrity of
encrypted network communications.
These communications may include
sensitive business information such as
transactions and payment data, as well as
technical information such as credentials
or configuration files
7
POS Checklist
A pointof sales(POS) systems needsassessmentisessential forplanningthe selectionand deploymentof pointof salessystem. Thischecklistwillassist
indefiningsystemrequirementsandwill also provide the foundationforVulnerabilitywhichcouldbe foundinthe control,the riskassociatedwiththe
vulnerability,itsimpactanalysis,anditstechnical recommendationswhichincludes(Configurational changes,Proceduralchanges,Software/Services
changesetc.)
PoS (Point of Sale ) Information Security Checklist
S. No Control Name Control Presence Risk Description Impact Severity Recommendation
1 
2 
3 
4
5 
8
References
1 http://www.internetsociety.org/doc/addressing-challenge-ip-spoofing
2 http://www.guru99.com/testing-for-retail-pos-point-of-sale-system.html
3 https://community.hpe.com/t5/Security-Research/Hacking-POS-Terminal-for-Fun-and-Non-profit/ba-p/6540620#.WEfkGNV97IU
4 http://www.pcworld.com/article/259882/vulnerabilities_in_payment_terminals_demonstrated_at_black_hat.html
5 https://pen-testing.sans.org/blog/2014/06/12/pen-testing-payment-terminals-a-step-by-step-how-to-guide
6 http://www.slideshare.net/evilhackerz/penetration-testing-guidancemarch2015

More Related Content

What's hot

Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing AttacksSysCloud
 
CYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptCYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptPraveen362297
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
Network Attacks and Countermeasures
Network Attacks and CountermeasuresNetwork Attacks and Countermeasures
Network Attacks and Countermeasureskaranwayne
 
Cross Site Scripting Defense Presentation
Cross Site Scripting Defense Presentation Cross Site Scripting Defense Presentation
Cross Site Scripting Defense Presentation Ikhade Maro Igbape
 
Introduction to Cross Site Scripting ( XSS )
Introduction to Cross Site Scripting ( XSS )Introduction to Cross Site Scripting ( XSS )
Introduction to Cross Site Scripting ( XSS )Irfad Imtiaz
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingNetsparker
 
Mobile protection
Mobile protection Mobile protection
Mobile protection preetpatel72
 
Buffer overflow attacks
Buffer overflow attacksBuffer overflow attacks
Buffer overflow attacksJoe McCarthy
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptxLakshayNRReddy
 
Security Vulnerabilities
Security VulnerabilitiesSecurity Vulnerabilities
Security VulnerabilitiesMarius Vorster
 
Need Of Security Operations Over SIEM
Need Of Security Operations Over SIEMNeed Of Security Operations Over SIEM
Need Of Security Operations Over SIEMSiemplify
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in IndiaYogesh Lolge
 

What's hot (20)

Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 
CYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptCYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.ppt
 
cyber crime
cyber crimecyber crime
cyber crime
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Network Attacks and Countermeasures
Network Attacks and CountermeasuresNetwork Attacks and Countermeasures
Network Attacks and Countermeasures
 
Mobile security
Mobile securityMobile security
Mobile security
 
Cross Site Scripting Defense Presentation
Cross Site Scripting Defense Presentation Cross Site Scripting Defense Presentation
Cross Site Scripting Defense Presentation
 
Unit 1
Unit 1Unit 1
Unit 1
 
Introduction to Cross Site Scripting ( XSS )
Introduction to Cross Site Scripting ( XSS )Introduction to Cross Site Scripting ( XSS )
Introduction to Cross Site Scripting ( XSS )
 
Firewalls
FirewallsFirewalls
Firewalls
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration Testing
 
Mobile protection
Mobile protection Mobile protection
Mobile protection
 
DDOS Attack
DDOS Attack DDOS Attack
DDOS Attack
 
Buffer overflow attacks
Buffer overflow attacksBuffer overflow attacks
Buffer overflow attacks
 
Packet Sniffing
Packet SniffingPacket Sniffing
Packet Sniffing
 
Advanced persistent threats(APT)
Advanced persistent threats(APT)Advanced persistent threats(APT)
Advanced persistent threats(APT)
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 
Security Vulnerabilities
Security VulnerabilitiesSecurity Vulnerabilities
Security Vulnerabilities
 
Need Of Security Operations Over SIEM
Need Of Security Operations Over SIEMNeed Of Security Operations Over SIEM
Need Of Security Operations Over SIEM
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
 

Viewers also liked

POS System
POS SystemPOS System
POS SystemHaptism
 
Open Street Map Moldova Project (sotm09)
Open Street Map Moldova Project (sotm09)Open Street Map Moldova Project (sotm09)
Open Street Map Moldova Project (sotm09)Anatolie Golovco
 
Advantages Of SQL
Advantages Of SQL Advantages Of SQL
Advantages Of SQL Intellipaat
 
Simplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USMSimplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USMAlienVault
 
Edc Machine User Guide
Edc Machine User GuideEdc Machine User Guide
Edc Machine User GuideKoson Nontaman
 
Advantages of pl sql
Advantages of pl sqlAdvantages of pl sql
Advantages of pl sqlIntellipaat
 
Group 1 pos system
Group 1   pos systemGroup 1   pos system
Group 1 pos systemmichael21120
 
Advantages And Benefits Of MIS In Your Career
Advantages And Benefits Of MIS In Your CareerAdvantages And Benefits Of MIS In Your Career
Advantages And Benefits Of MIS In Your Careermisc
 
proposal on point of sale information system of a super store
proposal on point of sale information system of a super storeproposal on point of sale information system of a super store
proposal on point of sale information system of a super storeHAMMAD AHMAD
 
Restaurant Management System
Restaurant Management SystemRestaurant Management System
Restaurant Management SystemJuliasmith1985
 
Network Proposal Power Point
Network Proposal Power PointNetwork Proposal Power Point
Network Proposal Power Pointguest7fbe17
 
Software Requirements Specification for restaurant management system
Software Requirements Specification for restaurant management systemSoftware Requirements Specification for restaurant management system
Software Requirements Specification for restaurant management systemSM. Aurnob
 
Advantages of MIS
Advantages of MISAdvantages of MIS
Advantages of MISMihir Busa
 
Advantages and Disadvantages of MIS
Advantages and Disadvantages of MISAdvantages and Disadvantages of MIS
Advantages and Disadvantages of MISNeeti Naag
 
Restaurant Management Systems
Restaurant Management SystemsRestaurant Management Systems
Restaurant Management SystemsAnil Bilgihan
 
Restaurent management system
Restaurent management systemRestaurent management system
Restaurent management systemSmit Patel
 

Viewers also liked (19)

POS System
POS SystemPOS System
POS System
 
Open Street Map Moldova Project (sotm09)
Open Street Map Moldova Project (sotm09)Open Street Map Moldova Project (sotm09)
Open Street Map Moldova Project (sotm09)
 
Advantages Of SQL
Advantages Of SQL Advantages Of SQL
Advantages Of SQL
 
Advantages of mis
Advantages of misAdvantages of mis
Advantages of mis
 
Simplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USMSimplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USM
 
Edc Machine User Guide
Edc Machine User GuideEdc Machine User Guide
Edc Machine User Guide
 
Advantages of pl sql
Advantages of pl sqlAdvantages of pl sql
Advantages of pl sql
 
Group 1 pos system
Group 1   pos systemGroup 1   pos system
Group 1 pos system
 
Advantages And Benefits Of MIS In Your Career
Advantages And Benefits Of MIS In Your CareerAdvantages And Benefits Of MIS In Your Career
Advantages And Benefits Of MIS In Your Career
 
proposal on point of sale information system of a super store
proposal on point of sale information system of a super storeproposal on point of sale information system of a super store
proposal on point of sale information system of a super store
 
Order now – restaurant management system
Order now – restaurant management systemOrder now – restaurant management system
Order now – restaurant management system
 
Restaurant Management System
Restaurant Management SystemRestaurant Management System
Restaurant Management System
 
Network Proposal Power Point
Network Proposal Power PointNetwork Proposal Power Point
Network Proposal Power Point
 
Point of Sale (POS)
Point of Sale (POS)Point of Sale (POS)
Point of Sale (POS)
 
Software Requirements Specification for restaurant management system
Software Requirements Specification for restaurant management systemSoftware Requirements Specification for restaurant management system
Software Requirements Specification for restaurant management system
 
Advantages of MIS
Advantages of MISAdvantages of MIS
Advantages of MIS
 
Advantages and Disadvantages of MIS
Advantages and Disadvantages of MISAdvantages and Disadvantages of MIS
Advantages and Disadvantages of MIS
 
Restaurant Management Systems
Restaurant Management SystemsRestaurant Management Systems
Restaurant Management Systems
 
Restaurent management system
Restaurent management systemRestaurent management system
Restaurent management system
 

Similar to Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hackers

Security communication
Security communicationSecurity communication
Security communicationSay Shyong
 
Top 20 cyber security interview questions and answers in 2023.pdf
Top 20 cyber security interview questions and answers in 2023.pdfTop 20 cyber security interview questions and answers in 2023.pdf
Top 20 cyber security interview questions and answers in 2023.pdfAnanthReddy38
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center FundamentalAmir Hossein Zargaran
 
System and web security
System and web securitySystem and web security
System and web securitychirag patil
 
Top 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdfTop 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdfinfosec train
 
Seucrity in a nutshell
Seucrity in a nutshellSeucrity in a nutshell
Seucrity in a nutshellYahia Kandeel
 
VTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesVTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesJayanth Dwijesh H P
 
Network and Security-2.pptx
Network and Security-2.pptxNetwork and Security-2.pptx
Network and Security-2.pptxDhanvanthkesavan
 
Backdoor Entry to a Windows Computer
Backdoor Entry to a Windows ComputerBackdoor Entry to a Windows Computer
Backdoor Entry to a Windows ComputerIRJET Journal
 
The Maple County court is redesigning its network to ensure more secu.docx
 The Maple County court is redesigning its network to ensure more secu.docx The Maple County court is redesigning its network to ensure more secu.docx
The Maple County court is redesigning its network to ensure more secu.docxKomlin1
 
Given below is an issue that you have identified as an issue in a ret.pdf
Given below is an issue that you have identified as an issue in a ret.pdfGiven below is an issue that you have identified as an issue in a ret.pdf
Given below is an issue that you have identified as an issue in a ret.pdfbirajdar2
 
2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx
2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx
2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docxvickeryr87
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Securityprachi67
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical HackingSripati Mahapatra
 

Similar to Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hackers (20)

Security communication
Security communicationSecurity communication
Security communication
 
Top 20 cyber security interview questions and answers in 2023.pdf
Top 20 cyber security interview questions and answers in 2023.pdfTop 20 cyber security interview questions and answers in 2023.pdf
Top 20 cyber security interview questions and answers in 2023.pdf
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
System and web security
System and web securitySystem and web security
System and web security
 
Top 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdfTop 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdf
 
CNS unit -1.docx
CNS unit -1.docxCNS unit -1.docx
CNS unit -1.docx
 
Seucrity in a nutshell
Seucrity in a nutshellSeucrity in a nutshell
Seucrity in a nutshell
 
UNIT 5 (2).pptx
UNIT 5 (2).pptxUNIT 5 (2).pptx
UNIT 5 (2).pptx
 
VTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesVTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notes
 
Network and Security-2.pptx
Network and Security-2.pptxNetwork and Security-2.pptx
Network and Security-2.pptx
 
Backdoor Entry to a Windows Computer
Backdoor Entry to a Windows ComputerBackdoor Entry to a Windows Computer
Backdoor Entry to a Windows Computer
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
The Maple County court is redesigning its network to ensure more secu.docx
 The Maple County court is redesigning its network to ensure more secu.docx The Maple County court is redesigning its network to ensure more secu.docx
The Maple County court is redesigning its network to ensure more secu.docx
 
Given below is an issue that you have identified as an issue in a ret.pdf
Given below is an issue that you have identified as an issue in a ret.pdfGiven below is an issue that you have identified as an issue in a ret.pdf
Given below is an issue that you have identified as an issue in a ret.pdf
 
2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx
2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx
2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
 
cybersecurity
cybersecuritycybersecurity
cybersecurity
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical Hacking
 

More from Syed Ubaid Ali Jafri

Requirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing LabRequirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing LabSyed Ubaid Ali Jafri
 
Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015Syed Ubaid Ali Jafri
 
Android 2.0 - 4.0 HTML Vulnerable
Android 2.0 - 4.0 HTML Vulnerable Android 2.0 - 4.0 HTML Vulnerable
Android 2.0 - 4.0 HTML Vulnerable Syed Ubaid Ali Jafri
 
Data Hiding (An Approach towards Stegnography)
Data Hiding (An Approach towards Stegnography) Data Hiding (An Approach towards Stegnography)
Data Hiding (An Approach towards Stegnography) Syed Ubaid Ali Jafri
 
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali JafriFinal Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali JafriSyed Ubaid Ali Jafri
 
Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7
Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7
Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7Syed Ubaid Ali Jafri
 
Syed Ubaid Ali Jafri - Cryptography Techniques
Syed Ubaid Ali Jafri - Cryptography TechniquesSyed Ubaid Ali Jafri - Cryptography Techniques
Syed Ubaid Ali Jafri - Cryptography TechniquesSyed Ubaid Ali Jafri
 
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for AssociatesSyed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for AssociatesSyed Ubaid Ali Jafri
 
Syed Ubaid Ali Jafri Lecture on Information Technology
Syed Ubaid Ali Jafri Lecture on Information Technology Syed Ubaid Ali Jafri Lecture on Information Technology
Syed Ubaid Ali Jafri Lecture on Information Technology Syed Ubaid Ali Jafri
 

More from Syed Ubaid Ali Jafri (18)

Requirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing LabRequirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing Lab
 
Review of network diagram
Review of network diagramReview of network diagram
Review of network diagram
 
Review of network diagram
Review of network diagramReview of network diagram
Review of network diagram
 
OSI Layered based attacks
OSI Layered based attacksOSI Layered based attacks
OSI Layered based attacks
 
Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015
 
Data calling from web to C#
Data calling from web to C#Data calling from web to C#
Data calling from web to C#
 
Android 2.0 - 4.0 HTML Vulnerable
Android 2.0 - 4.0 HTML Vulnerable Android 2.0 - 4.0 HTML Vulnerable
Android 2.0 - 4.0 HTML Vulnerable
 
Data Hiding (An Approach towards Stegnography)
Data Hiding (An Approach towards Stegnography) Data Hiding (An Approach towards Stegnography)
Data Hiding (An Approach towards Stegnography)
 
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali JafriFinal Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri
 
Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7
Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7
Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7
 
Syed Ubaid Ali Jafri - Cryptography Techniques
Syed Ubaid Ali Jafri - Cryptography TechniquesSyed Ubaid Ali Jafri - Cryptography Techniques
Syed Ubaid Ali Jafri - Cryptography Techniques
 
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for AssociatesSyed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
 
Syed Ubaid Ali Jafri Lecture on Information Technology
Syed Ubaid Ali Jafri Lecture on Information Technology Syed Ubaid Ali Jafri Lecture on Information Technology
Syed Ubaid Ali Jafri Lecture on Information Technology
 
Storage area network
Storage area networkStorage area network
Storage area network
 
Securing wireless network
Securing wireless networkSecuring wireless network
Securing wireless network
 
IP Security over VPN
IP Security over VPNIP Security over VPN
IP Security over VPN
 
Network security over ethernet
Network security over ethernetNetwork security over ethernet
Network security over ethernet
 
LAN Security
LAN Security LAN Security
LAN Security
 

Recently uploaded

Get Premium Pimple Saudagar Call Girls (8005736733) 24x7 Rate 15999 with A/c ...
Get Premium Pimple Saudagar Call Girls (8005736733) 24x7 Rate 15999 with A/c ...Get Premium Pimple Saudagar Call Girls (8005736733) 24x7 Rate 15999 with A/c ...
Get Premium Pimple Saudagar Call Girls (8005736733) 24x7 Rate 15999 with A/c ...MOHANI PANDEY
 
Deira Dubai Escorts +0561951007 Escort Service in Dubai by Dubai Escort Girls
Deira Dubai Escorts +0561951007 Escort Service in Dubai by Dubai Escort GirlsDeira Dubai Escorts +0561951007 Escort Service in Dubai by Dubai Escort Girls
Deira Dubai Escorts +0561951007 Escort Service in Dubai by Dubai Escort GirlsEscorts Call Girls
 
Top Rated Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated  Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Top Rated  Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Call Girls in Nagpur High Profile
 
9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...Pooja Nehwal
 
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证tufbav
 
↑Top celebrity ( Pune ) Nagerbazar Call Girls8250192130 unlimited shot and al...
↑Top celebrity ( Pune ) Nagerbazar Call Girls8250192130 unlimited shot and al...↑Top celebrity ( Pune ) Nagerbazar Call Girls8250192130 unlimited shot and al...
↑Top celebrity ( Pune ) Nagerbazar Call Girls8250192130 unlimited shot and al...Call Girls in Nagpur High Profile
 
Book Sex Workers Available Pune Call Girls Yerwada 6297143586 Call Hot India...
Book Sex Workers Available Pune Call Girls Yerwada  6297143586 Call Hot India...Book Sex Workers Available Pune Call Girls Yerwada  6297143586 Call Hot India...
Book Sex Workers Available Pune Call Girls Yerwada 6297143586 Call Hot India...Call Girls in Nagpur High Profile
 
Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...
Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...
Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...amitlee9823
 
9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...
9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...
9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...Pooja Nehwal
 
VIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝
Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝
Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证tufbav
 
Escorts Service Sanjay Nagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Sanjay Nagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)Escorts Service Sanjay Nagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Sanjay Nagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)amitlee9823
 
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证ehyxf
 
Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...amitlee9823
 
CALL GIRLS IN Saket 83778-77756 | Escort Service In DELHI NcR
CALL GIRLS IN Saket 83778-77756 | Escort Service In DELHI NcRCALL GIRLS IN Saket 83778-77756 | Escort Service In DELHI NcR
CALL GIRLS IN Saket 83778-77756 | Escort Service In DELHI NcRdollysharma2066
 
VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...
VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...
VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...Call Girls in Nagpur High Profile
 

Recently uploaded (20)

Get Premium Pimple Saudagar Call Girls (8005736733) 24x7 Rate 15999 with A/c ...
Get Premium Pimple Saudagar Call Girls (8005736733) 24x7 Rate 15999 with A/c ...Get Premium Pimple Saudagar Call Girls (8005736733) 24x7 Rate 15999 with A/c ...
Get Premium Pimple Saudagar Call Girls (8005736733) 24x7 Rate 15999 with A/c ...
 
(INDIRA) Call Girl Napur Call Now 8617697112 Napur Escorts 24x7
(INDIRA) Call Girl Napur Call Now 8617697112 Napur Escorts 24x7(INDIRA) Call Girl Napur Call Now 8617697112 Napur Escorts 24x7
(INDIRA) Call Girl Napur Call Now 8617697112 Napur Escorts 24x7
 
Deira Dubai Escorts +0561951007 Escort Service in Dubai by Dubai Escort Girls
Deira Dubai Escorts +0561951007 Escort Service in Dubai by Dubai Escort GirlsDeira Dubai Escorts +0561951007 Escort Service in Dubai by Dubai Escort Girls
Deira Dubai Escorts +0561951007 Escort Service in Dubai by Dubai Escort Girls
 
Top Rated Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated  Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...Top Rated  Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
Top Rated Pune Call Girls Shirwal ⟟ 6297143586 ⟟ Call Me For Genuine Sex Ser...
 
9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...
 
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
 
↑Top celebrity ( Pune ) Nagerbazar Call Girls8250192130 unlimited shot and al...
↑Top celebrity ( Pune ) Nagerbazar Call Girls8250192130 unlimited shot and al...↑Top celebrity ( Pune ) Nagerbazar Call Girls8250192130 unlimited shot and al...
↑Top celebrity ( Pune ) Nagerbazar Call Girls8250192130 unlimited shot and al...
 
Book Sex Workers Available Pune Call Girls Yerwada 6297143586 Call Hot India...
Book Sex Workers Available Pune Call Girls Yerwada  6297143586 Call Hot India...Book Sex Workers Available Pune Call Girls Yerwada  6297143586 Call Hot India...
Book Sex Workers Available Pune Call Girls Yerwada 6297143586 Call Hot India...
 
CHEAP Call Girls in Vinay Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Vinay Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Vinay Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Vinay Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...
Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...
Vip Mumbai Call Girls Andheri East Call On 9920725232 With Body to body massa...
 
9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...
9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...
9892124323 Pooja Nehwal Call Girls Services Call Girls service in Santacruz A...
 
VIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 Booking
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝
Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝
Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝
 
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
 
Escorts Service Sanjay Nagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Sanjay Nagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)Escorts Service Sanjay Nagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Escorts Service Sanjay Nagar ☎ 7737669865☎ Book Your One night Stand (Bangalore)
 
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
怎样办理圣芭芭拉分校毕业证(UCSB毕业证书)成绩单留信认证
 
CHEAP Call Girls in Mayapuri (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Mayapuri  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Mayapuri  (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Mayapuri (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
 
CALL GIRLS IN Saket 83778-77756 | Escort Service In DELHI NcR
CALL GIRLS IN Saket 83778-77756 | Escort Service In DELHI NcRCALL GIRLS IN Saket 83778-77756 | Escort Service In DELHI NcR
CALL GIRLS IN Saket 83778-77756 | Escort Service In DELHI NcR
 
VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...
VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...
VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...
 

Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hackers

  • 1. 1 TECHNICAL GUIDELINES ON How to Secure a POS System from Hackers By: Syed Ubaid Ali Jafri Information Security Professional LinkedIn: https://pk.linkedin.com/in/ubaidjafri
  • 2. 2 Contents Background..............................................................................................................................................................................................................3 Objective..................................................................................................................................................................................................................3 Testing Type .............................................................................................................................................................................................................3 TOP 15 Controls Checklist..........................................................................................................................................................................................4 POS Checklist............................................................................................................................................................................................................7 References................................................................................................................................................................................................................8
  • 3. 3 Background The payment terminals we are talking about are tamper proof. They usually have Ethernet connectivity, and a serial line. The interface open to normal user is the card slot and PIN pad, and in some occasions contactless reader. The actual configuration does vary between models and vendors, but the basic idea is that the terminal initiates all the connections and doesn't listen to anything incoming. Objective Our objective for publishing this document is to ensure technically that the initial security up to a level where POS should be secure from basic attacks. Testing Type This testing involves the Physical layer to Presentation Layer testing which includes the following controls but not limited to S.No Control Name 1 Insecure Physical Connectivity 2 IP/MAC Address Spoofing 3 Weak or Default credentials on Device 4 Insecure Communication Protocol 5 Unencrypted Data Travelling 6 Insecure Data Storage 7 Sensitive Information Disclosure 8 Shared File Enumeration 9 Stress testing of PoS Machine 10 Inadequate Transaction Handling 11 Un-necessary services/Ports open 12 Absence of Audit Logging 13 Missing Patches 14 SNMP public community string 15 SSL/TLS Configuration Weaknesses
  • 4. 4 TOP 15 Controls Checklist Summary Sheet of Controls S. No Control Name Control Description Severity Impact 1 Physical Connectivity of PoS The Network connectivity of of PoS device whether the device is connected with Wireless Router or with LAN Switch. Ensure that no other user is able to connect to the same Wifi or LAN Network High An attacker or malicious user with local network access is able to plug their infected machine with the network connected to a PoS system, An attacker would be able to sniff or capture the data on the network. An attacker can easily perform a MiTM attack against this connectivity, 2 IP/MAC Address Spoofing A network attacker can use a protocol analyzer to know a valid MAC address, By examining the MAC Address, An Attacker is able to spoofed the IP/MAC Address of the POS Machine High An attacker can easily steal the identity of the device, an attacker can perform the malicious activity by showing the legitimate device identity which doesn’t belong to them. 3 Weak or Default credentials on Device Device is using the default username or password for hardware administration High An attacker or malicious user is able to perform modification by using the default credentials on device, an attacker is able to change or modify the hardware configurations on device. 4 Insecure Communication Protocol Device is using the weak protocols (FTP, Telnet, VNC, RDP) for remote administration which could lead towards confidentiality, intigrity , availability attack High An attacker or malicious user, with local network access, is able to perform a Man- in-the-Middle attack (MITM) and can see all communication between the POS and the FTP server on the. Using a username and password obtained by passively sniffing traffic on the network, the attacker can connect to the FTP server, download, modify, and then upload arbitrary files 5 Unencrypted Data Travelling Device is able to send data unencrypted on Wifi/LAN channel High An Attacker or malicious user, with local network access, is able to perform a sniffing attack on Wi-Fi/LAN Network. Capturing the unencrypted traffic contains the sensitive information of (Usernames, Password, accounts information)
  • 5. 5 6 Insecure Data Storage Device is able to store the data on Memory card or in the device itself High An attacker is able to copy all the stored data on the machine or in the memory card, which could help an attacker to generate the fake card of original values stored in the device or memory card, by using different strip card reader writer machines. 7 Sensitive Information Disclosure Device is capable to exposing the sensitive data which contains (Track 1 record, Track 2 record and CVV Number of customer High An attacker is able to read or sniff the Track-1, Track-2 Data of customer which could impact towards fake card generation or online sale purchasing of goods. 8 Shared File Enumeration Device has multiple open folders that are shared and has access to the root directory directly High This may directly lead to system compromise by allowing modification of system files. 9 Stress Testing of Pos Terminal The device is not capable for handling huge load on the network, the devices is able to randomly shut down and restart ports on the network switches/routers that connect the servers (via SNMP commands for example), double the baseline number for concurrent users/HTTP connections High An attacker using less skills can perform the attacker on the system which could lead towards availability attack. 10 Inadequate Transaction Handling An attacker is able to retrieve the configuration information from the Server, the authentication takes place in plaintext over the local network, and all the transactions are shown in plaintext in the text file. High An attacker can perform the Man-in-the- Middle attack and can change the price value, modify the items and their date. 11 Un-necessary services/Ports open There are multiple ports that are open and not being used on the device Medium By using unused port an attacker can perform a brute force attack or sending the SYN request to the terminal machine which could lead towards availability attack.
  • 6. 6 12 Absence of Audit Logging Device is not able to record the logs of (Logged in, Transactions, Network Connectivity) Medium Due to absence of Audit Logging, An attacker can easily perform malicious activities and hide their tracks. 13 Missing Patches Critical Microsoft security patches were not installed on the PoS Sytem. The missing patches address vulnerabilities which may allow unauthenticated remote code execution, privilege escalation, denial of service, and confidential information disclosure Medium An attacker or malicious user with network access may be able to view sensitive information, cause Denial-of- Service, or execute arbitrary code. An attacker with local access to the hosts may be able to escalate their privileges up to the administrator level. 14 SNMP public community string Simple Network Management Protocol (SNMP) community string ‘public’ is used on the PoS Machine, granting READ-ONLY access to information on remote hosts. SNMP is generally used for system and network monitoring purposes. Typically, a remote network management server queries a remote SNMP agent (residing on the target system) for system status, by supplying a community string for authentication. Medium An attacker or malicious user is able to use the default SNMP community string to discover detailed device metadata and network configuration details, which can assist in other attacks. The information disclosed includes the operating system version, a list of users on the system, a list of installed software, any enabled network interfaces, routing information, as well as any open TCP connections. 15 SSL/TLS Configuration Weaknesses Secure Sockets Layer (SSL) and Transport Layer Security (TLS) are used in the POS environment to protect the confidentiality and integrity of connections to database servers, and to the administrative web interface of the site router. We identified the following misconfigurations with the implementation of SSL/TLS. Medium An attacker or malicious user with network access is able to impersonate SSL/TLS-protected services, or carry out Man-in-The-Middle attacks, compromising the confidentiality and integrity of encrypted network communications. These communications may include sensitive business information such as transactions and payment data, as well as technical information such as credentials or configuration files
  • 7. 7 POS Checklist A pointof sales(POS) systems needsassessmentisessential forplanningthe selectionand deploymentof pointof salessystem. Thischecklistwillassist indefiningsystemrequirementsandwill also provide the foundationforVulnerabilitywhichcouldbe foundinthe control,the riskassociatedwiththe vulnerability,itsimpactanalysis,anditstechnical recommendationswhichincludes(Configurational changes,Proceduralchanges,Software/Services changesetc.) PoS (Point of Sale ) Information Security Checklist S. No Control Name Control Presence Risk Description Impact Severity Recommendation 1  2  3  4 5 
  • 8. 8 References 1 http://www.internetsociety.org/doc/addressing-challenge-ip-spoofing 2 http://www.guru99.com/testing-for-retail-pos-point-of-sale-system.html 3 https://community.hpe.com/t5/Security-Research/Hacking-POS-Terminal-for-Fun-and-Non-profit/ba-p/6540620#.WEfkGNV97IU 4 http://www.pcworld.com/article/259882/vulnerabilities_in_payment_terminals_demonstrated_at_black_hat.html 5 https://pen-testing.sans.org/blog/2014/06/12/pen-testing-payment-terminals-a-step-by-step-how-to-guide 6 http://www.slideshare.net/evilhackerz/penetration-testing-guidancemarch2015