SlideShare a Scribd company logo
DATA INTEGRITY CHECKS
#whoami – Savan Gadhiya
■ Senior Security Consultant at NotSoSecure
■ Hacker, Security Researcher, Developer and Bounty Hunter ☺
■ 7 years of experience in Information Technology
■ Master of Engineering in IT Systems and Network Security
■ LinkedIn: https://in.linkedin.com/in/gadhiyasavan
■ Twitter: https://twitter.com/gadhiyasavan
Information Security – Key Concepts
Integrity
Availability
Confidentiality
Information Security – Key Concepts
■ CIA/AIC Triad
– Confidentiality – Data should be accessible to authorized persons only
– Integrity – Data should be unaltered
– Availability – Data should be available when required to authorized entities
■ Others
– Authentication – Identify the user
– Non-Repudiation – Data ownership disputes
– Access Control – Who should be able to access what?
Data Integrity
■ As a process, data integrity verifies that data has remained unaltered in transit from
creation to reception
■ Data must be kept free from corruption, modification, insertion, deletion or replay
■ Assurance of data integrity:
– Data encryption, which locks data by cipher
– Data backup, which stores a copy of data in an alternate location
– Access controls, including assignment of read/write privileges
– Input validation, to prevent incorrect data entry
– Data validation, to certify uncorrupted transmission
Checksum
■ A checksum is a small-sized datum derived from a block of digital data
for the purpose of detecting errors which may have been introduced
during its transmission or storage
■ Checksum is usually applied to an installation file after it is received
from the download server. By themselves, checksums are often used
to verify data integrity but are not relied upon to verify data
authenticity
Luhn Algorithm – Checksum formula
■ Luhn Algorithm also known as “modulus 10” or “mod 10” algorithm
■ A simple checksum formula used to validate a variety of identification
numbers
■ Widely used for:
– Credit Card Numbers
– International Mobile Equipment Identity(IMEI) Numbers
– Social Security Numbers
– Social Insurance Numbers
Luhn Algorithm
Checksum Digit • Right most digit
Double Second Digit
• Double the every other/second digit
• Starting from next digit to Checksum
• Right to Left (except the checksum)
Sum Digits • Sum each digits
Identify the Checksum
• Method 1:
• Take the units digit from Sum – e.g. 67 → 7
• Subtract units digit from 10 – e.g. 10 – 7 = 3
• If sum digit ends with 0 then checksum is 0 – 60 → 0
• Method 2:
• Multiply sum with 9 – e.g. 67*9 = 603
• Units digit is checksum – e.g. 603 → 3
Luhn Algorithm – Validate Checksum
■ Identify the valid number from the list
– 79927398710, 79927398711, 79927398712, … , 79927398719
■ Double the every second number – 7 9 9 2 7 3 9 8 7 1 X
– (1*2) = 2, (8*2) = 16, (3*2) = 6, (2*2) = 4, (9*2) = 18
■ Sum all individual digits
– (X) + 2 + 7 + (1 + 6) + 9 + 6 + 7 + 4 + 9 + (1 + 8) + 7 = 67
■ If the Sum is a multiple of 10, the number is valid
– 60, 70, 80, 90 etc.
– Hence, 67 + X = 70 – To be a next multiplication of 10
– Checksum is 3, X=3 → Valid number is 79927398713
Luhn Algorithm – Penetration Testing
■ Luhn Algorithm/mod 10 will produce only ONE valid number from 10 sequential
numbers
■ Most of the banking/payment websites prevent from brute-force attack and uses
rate limit
– Brute force the card numbers from 4242 4242 4242 0000 to 4242 4242
4242 9999
– 10,000 possibilities - Ah rate-limit is only 1,000 
■ Unique numbers will be only 1,000 then why do we need to brute-force all?
■ How can we brute force effectively using Lunn Number?
– Burp Payload Processing
■ Extension: Burp Luhn Payload Processor
Demo – Burp Luhn Payload Processor
■ How can we brute force effectively using Lunn Number?
– Burp Payload Processing
■ Extension: Burp Luhn Payload Processor – Figure shows list of valid numbers
References
■ https://en.wikipedia.org/wiki/Information_security
■ https://en.wikipedia.org/wiki/Luhn_algorithm
■ https://patentimages.storage.googleapis.com/ec/2a/f7/b9af046ed26128/US295
0048.pdf
■ https://github.com/EnableSecurity/burp-luhn-payload-processor
Questions?

More Related Content

Similar to Data Integrity Checks & Lunh Algorithm

Security access and payments methods
Security access and payments methodsSecurity access and payments methods
Security access and payments methods
adiabo
 
Security access and payments methods
Security access and payments methodsSecurity access and payments methods
Security access and payments methods
adiabo
 
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
nexxtep
 
Security Breakout Session
Security Breakout Session Security Breakout Session
Security Breakout Session
Splunk
 
Understanding computer attacks and attackers - Eric Vanderburg - JURINNOV
Understanding computer attacks and attackers - Eric Vanderburg - JURINNOVUnderstanding computer attacks and attackers - Eric Vanderburg - JURINNOV
Understanding computer attacks and attackers - Eric Vanderburg - JURINNOV
Eric Vanderburg
 
001.itsecurity bcp v1
001.itsecurity bcp v1001.itsecurity bcp v1
001.itsecurity bcp v1
Mohammad Ashfaqur Rahman
 
Security fundamentals
Security fundamentalsSecurity fundamentals
Security fundamentals
SofoklisEfremidisAIT
 
Security Fundamentals
Security FundamentalsSecurity Fundamentals
Security Fundamentals
SecureIoT H2020 funded project
 
Iaetsd vulnerabilities in credit card security
Iaetsd vulnerabilities in credit card securityIaetsd vulnerabilities in credit card security
Iaetsd vulnerabilities in credit card security
Iaetsd Iaetsd
 
Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"
Billtrust
 
Automatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoTAutomatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoT
automatskicorporation
 
Privacy Preservation Issues in Association Rule Mining in Horizontally Partit...
Privacy Preservation Issues in Association Rule Mining in Horizontally Partit...Privacy Preservation Issues in Association Rule Mining in Horizontally Partit...
Privacy Preservation Issues in Association Rule Mining in Horizontally Partit...
Abhra Basak
 
Unit-5.pptx
Unit-5.pptxUnit-5.pptx
Unit-5.pptx
RoyBokhiriya
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygiene
EricK Gasana
 
Meletis Belsis - Introduction to information security
Meletis Belsis - Introduction to information securityMeletis Belsis - Introduction to information security
Meletis Belsis - Introduction to information security
Meletis Belsis MPhil/MRes/BSc
 
Simplitfy - Guarding your Data
Simplitfy - Guarding your DataSimplitfy - Guarding your Data
Simplitfy - Guarding your Data
Erick Solms
 
Cyber security
Cyber securityCyber security
Cyber security
Ashok Mankodi
 
Security.ppt
Security.pptSecurity.ppt
Security.ppt
SherefHesham
 
Security For The People: End-User Authentication Security on the Internet by ...
Security For The People: End-User Authentication Security on the Internet by ...Security For The People: End-User Authentication Security on the Internet by ...
Security For The People: End-User Authentication Security on the Internet by ...
Duo Security
 
Fraud Meetup
Fraud MeetupFraud Meetup
Fraud Meetup
JohnNellen
 

Similar to Data Integrity Checks & Lunh Algorithm (20)

Security access and payments methods
Security access and payments methodsSecurity access and payments methods
Security access and payments methods
 
Security access and payments methods
Security access and payments methodsSecurity access and payments methods
Security access and payments methods
 
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
What You Can Do to Keep Your Email, Bank Accounts and Business Safe from Cybe...
 
Security Breakout Session
Security Breakout Session Security Breakout Session
Security Breakout Session
 
Understanding computer attacks and attackers - Eric Vanderburg - JURINNOV
Understanding computer attacks and attackers - Eric Vanderburg - JURINNOVUnderstanding computer attacks and attackers - Eric Vanderburg - JURINNOV
Understanding computer attacks and attackers - Eric Vanderburg - JURINNOV
 
001.itsecurity bcp v1
001.itsecurity bcp v1001.itsecurity bcp v1
001.itsecurity bcp v1
 
Security fundamentals
Security fundamentalsSecurity fundamentals
Security fundamentals
 
Security Fundamentals
Security FundamentalsSecurity Fundamentals
Security Fundamentals
 
Iaetsd vulnerabilities in credit card security
Iaetsd vulnerabilities in credit card securityIaetsd vulnerabilities in credit card security
Iaetsd vulnerabilities in credit card security
 
Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"
 
Automatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoTAutomatski - The Internet of Things - Privacy in IoT
Automatski - The Internet of Things - Privacy in IoT
 
Privacy Preservation Issues in Association Rule Mining in Horizontally Partit...
Privacy Preservation Issues in Association Rule Mining in Horizontally Partit...Privacy Preservation Issues in Association Rule Mining in Horizontally Partit...
Privacy Preservation Issues in Association Rule Mining in Horizontally Partit...
 
Unit-5.pptx
Unit-5.pptxUnit-5.pptx
Unit-5.pptx
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygiene
 
Meletis Belsis - Introduction to information security
Meletis Belsis - Introduction to information securityMeletis Belsis - Introduction to information security
Meletis Belsis - Introduction to information security
 
Simplitfy - Guarding your Data
Simplitfy - Guarding your DataSimplitfy - Guarding your Data
Simplitfy - Guarding your Data
 
Cyber security
Cyber securityCyber security
Cyber security
 
Security.ppt
Security.pptSecurity.ppt
Security.ppt
 
Security For The People: End-User Authentication Security on the Internet by ...
Security For The People: End-User Authentication Security on the Internet by ...Security For The People: End-User Authentication Security on the Internet by ...
Security For The People: End-User Authentication Security on the Internet by ...
 
Fraud Meetup
Fraud MeetupFraud Meetup
Fraud Meetup
 

Recently uploaded

DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSISDECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
Tier1 app
 
How GenAI Can Improve Supplier Performance Management.pdf
How GenAI Can Improve Supplier Performance Management.pdfHow GenAI Can Improve Supplier Performance Management.pdf
How GenAI Can Improve Supplier Performance Management.pdf
Zycus
 
The Comprehensive Guide to Validating Audio-Visual Performances.pdf
The Comprehensive Guide to Validating Audio-Visual Performances.pdfThe Comprehensive Guide to Validating Audio-Visual Performances.pdf
The Comprehensive Guide to Validating Audio-Visual Performances.pdf
kalichargn70th171
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
Drona Infotech
 
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
gapen1
 
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
Bert Jan Schrijver
 
ppt on the brain chip neuralink.pptx
ppt  on   the brain  chip neuralink.pptxppt  on   the brain  chip neuralink.pptx
ppt on the brain chip neuralink.pptx
Reetu63
 
The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...
The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...
The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...
kalichargn70th171
 
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
kgyxske
 
Building API data products on top of your real-time data infrastructure
Building API data products on top of your real-time data infrastructureBuilding API data products on top of your real-time data infrastructure
Building API data products on top of your real-time data infrastructure
confluent
 
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
dakas1
 
Going AOT: Everything you need to know about GraalVM for Java applications
Going AOT: Everything you need to know about GraalVM for Java applicationsGoing AOT: Everything you need to know about GraalVM for Java applications
Going AOT: Everything you need to know about GraalVM for Java applications
Alina Yurenko
 
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdfBaha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid
 
Superpower Your Apache Kafka Applications Development with Complementary Open...
Superpower Your Apache Kafka Applications Development with Complementary Open...Superpower Your Apache Kafka Applications Development with Complementary Open...
Superpower Your Apache Kafka Applications Development with Complementary Open...
Paul Brebner
 
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...
Luigi Fugaro
 
Microsoft-Power-Platform-Adoption-Planning.pptx
Microsoft-Power-Platform-Adoption-Planning.pptxMicrosoft-Power-Platform-Adoption-Planning.pptx
Microsoft-Power-Platform-Adoption-Planning.pptx
jrodriguezq3110
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
Alberto Brandolini
 
美洲杯赔率投注网【​网址​🎉3977·EE​🎉】
美洲杯赔率投注网【​网址​🎉3977·EE​🎉】美洲杯赔率投注网【​网址​🎉3977·EE​🎉】
美洲杯赔率投注网【​网址​🎉3977·EE​🎉】
widenerjobeyrl638
 
Penify - Let AI do the Documentation, you write the Code.
Penify - Let AI do the Documentation, you write the Code.Penify - Let AI do the Documentation, you write the Code.
Penify - Let AI do the Documentation, you write the Code.
KrishnaveniMohan1
 
Streamlining End-to-End Testing Automation
Streamlining End-to-End Testing AutomationStreamlining End-to-End Testing Automation
Streamlining End-to-End Testing Automation
Anand Bagmar
 

Recently uploaded (20)

DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSISDECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
DECODING JAVA THREAD DUMPS: MASTER THE ART OF ANALYSIS
 
How GenAI Can Improve Supplier Performance Management.pdf
How GenAI Can Improve Supplier Performance Management.pdfHow GenAI Can Improve Supplier Performance Management.pdf
How GenAI Can Improve Supplier Performance Management.pdf
 
The Comprehensive Guide to Validating Audio-Visual Performances.pdf
The Comprehensive Guide to Validating Audio-Visual Performances.pdfThe Comprehensive Guide to Validating Audio-Visual Performances.pdf
The Comprehensive Guide to Validating Audio-Visual Performances.pdf
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
 
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
 
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
 
ppt on the brain chip neuralink.pptx
ppt  on   the brain  chip neuralink.pptxppt  on   the brain  chip neuralink.pptx
ppt on the brain chip neuralink.pptx
 
The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...
The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...
The Power of Visual Regression Testing_ Why It Is Critical for Enterprise App...
 
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
一比一原版(sdsu毕业证书)圣地亚哥州立大学毕业证如何办理
 
Building API data products on top of your real-time data infrastructure
Building API data products on top of your real-time data infrastructureBuilding API data products on top of your real-time data infrastructure
Building API data products on top of your real-time data infrastructure
 
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
 
Going AOT: Everything you need to know about GraalVM for Java applications
Going AOT: Everything you need to know about GraalVM for Java applicationsGoing AOT: Everything you need to know about GraalVM for Java applications
Going AOT: Everything you need to know about GraalVM for Java applications
 
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdfBaha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
 
Superpower Your Apache Kafka Applications Development with Complementary Open...
Superpower Your Apache Kafka Applications Development with Complementary Open...Superpower Your Apache Kafka Applications Development with Complementary Open...
Superpower Your Apache Kafka Applications Development with Complementary Open...
 
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...
 
Microsoft-Power-Platform-Adoption-Planning.pptx
Microsoft-Power-Platform-Adoption-Planning.pptxMicrosoft-Power-Platform-Adoption-Planning.pptx
Microsoft-Power-Platform-Adoption-Planning.pptx
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
 
美洲杯赔率投注网【​网址​🎉3977·EE​🎉】
美洲杯赔率投注网【​网址​🎉3977·EE​🎉】美洲杯赔率投注网【​网址​🎉3977·EE​🎉】
美洲杯赔率投注网【​网址​🎉3977·EE​🎉】
 
Penify - Let AI do the Documentation, you write the Code.
Penify - Let AI do the Documentation, you write the Code.Penify - Let AI do the Documentation, you write the Code.
Penify - Let AI do the Documentation, you write the Code.
 
Streamlining End-to-End Testing Automation
Streamlining End-to-End Testing AutomationStreamlining End-to-End Testing Automation
Streamlining End-to-End Testing Automation
 

Data Integrity Checks & Lunh Algorithm

  • 2. #whoami – Savan Gadhiya ■ Senior Security Consultant at NotSoSecure ■ Hacker, Security Researcher, Developer and Bounty Hunter ☺ ■ 7 years of experience in Information Technology ■ Master of Engineering in IT Systems and Network Security ■ LinkedIn: https://in.linkedin.com/in/gadhiyasavan ■ Twitter: https://twitter.com/gadhiyasavan
  • 3. Information Security – Key Concepts Integrity Availability Confidentiality
  • 4. Information Security – Key Concepts ■ CIA/AIC Triad – Confidentiality – Data should be accessible to authorized persons only – Integrity – Data should be unaltered – Availability – Data should be available when required to authorized entities ■ Others – Authentication – Identify the user – Non-Repudiation – Data ownership disputes – Access Control – Who should be able to access what?
  • 5. Data Integrity ■ As a process, data integrity verifies that data has remained unaltered in transit from creation to reception ■ Data must be kept free from corruption, modification, insertion, deletion or replay ■ Assurance of data integrity: – Data encryption, which locks data by cipher – Data backup, which stores a copy of data in an alternate location – Access controls, including assignment of read/write privileges – Input validation, to prevent incorrect data entry – Data validation, to certify uncorrupted transmission
  • 6. Checksum ■ A checksum is a small-sized datum derived from a block of digital data for the purpose of detecting errors which may have been introduced during its transmission or storage ■ Checksum is usually applied to an installation file after it is received from the download server. By themselves, checksums are often used to verify data integrity but are not relied upon to verify data authenticity
  • 7. Luhn Algorithm – Checksum formula ■ Luhn Algorithm also known as “modulus 10” or “mod 10” algorithm ■ A simple checksum formula used to validate a variety of identification numbers ■ Widely used for: – Credit Card Numbers – International Mobile Equipment Identity(IMEI) Numbers – Social Security Numbers – Social Insurance Numbers
  • 8. Luhn Algorithm Checksum Digit • Right most digit Double Second Digit • Double the every other/second digit • Starting from next digit to Checksum • Right to Left (except the checksum) Sum Digits • Sum each digits Identify the Checksum • Method 1: • Take the units digit from Sum – e.g. 67 → 7 • Subtract units digit from 10 – e.g. 10 – 7 = 3 • If sum digit ends with 0 then checksum is 0 – 60 → 0 • Method 2: • Multiply sum with 9 – e.g. 67*9 = 603 • Units digit is checksum – e.g. 603 → 3
  • 9. Luhn Algorithm – Validate Checksum ■ Identify the valid number from the list – 79927398710, 79927398711, 79927398712, … , 79927398719 ■ Double the every second number – 7 9 9 2 7 3 9 8 7 1 X – (1*2) = 2, (8*2) = 16, (3*2) = 6, (2*2) = 4, (9*2) = 18 ■ Sum all individual digits – (X) + 2 + 7 + (1 + 6) + 9 + 6 + 7 + 4 + 9 + (1 + 8) + 7 = 67 ■ If the Sum is a multiple of 10, the number is valid – 60, 70, 80, 90 etc. – Hence, 67 + X = 70 – To be a next multiplication of 10 – Checksum is 3, X=3 → Valid number is 79927398713
  • 10. Luhn Algorithm – Penetration Testing ■ Luhn Algorithm/mod 10 will produce only ONE valid number from 10 sequential numbers ■ Most of the banking/payment websites prevent from brute-force attack and uses rate limit – Brute force the card numbers from 4242 4242 4242 0000 to 4242 4242 4242 9999 – 10,000 possibilities - Ah rate-limit is only 1,000  ■ Unique numbers will be only 1,000 then why do we need to brute-force all? ■ How can we brute force effectively using Lunn Number? – Burp Payload Processing ■ Extension: Burp Luhn Payload Processor
  • 11. Demo – Burp Luhn Payload Processor ■ How can we brute force effectively using Lunn Number? – Burp Payload Processing ■ Extension: Burp Luhn Payload Processor – Figure shows list of valid numbers
  • 12. References ■ https://en.wikipedia.org/wiki/Information_security ■ https://en.wikipedia.org/wiki/Luhn_algorithm ■ https://patentimages.storage.googleapis.com/ec/2a/f7/b9af046ed26128/US295 0048.pdf ■ https://github.com/EnableSecurity/burp-luhn-payload-processor