SlideShare a Scribd company logo
Attacking the Traveling Salesman
Point-of-sale attacks on airline travelers
DEFCON 2014
Alex Zacharis
Nikos Tsagkarakis
info@census-labs.com
Census S.A.
http://census-labs.com/
Contents
• Why target travelers?
• Point-of-Sale attacks in transportation
• Case Study
• Back to the Lab
• POS: exploiting different modules
• Cameras everywhere
• Scan that QR
• RAM scrapping
• TS POS Malware
• Aztec Revenge Tool
Why target travelers?
● The need for communication is greater than privacy and/or
security
● The unknown Internet access landscape forces you to trust
what you normally wouldn’t
• WiFi:
• Login to (corporate) email accounts
• Login to social networks
• Carry mobile phones, tablets, laptops ,usually all on at the
same time ;)
• No second thoughts about public Internet hotspots
Point-of-Sale attacks in Transportation
Unlike traditional POS attacks in Commerce (ex.
Target Incident):
• Credit card details
• Web credentials
We target International Travelers' information:
• Name
• Picture
• Flight number
• Destination
• Seat number
• Communication partners
• Other_.
How is the POS introduced
As in every known POS Attack (Retail, Healthcare, etc):
1. The system may have unpatched
vulnerabilities
2. An employee of the victim company may
introduce it by mistake (opening an email
attachment containing malware)
3. The source might even be an employee
looking to cause trouble.
POS attack outcome
Who benefits?
•Cyber Criminals (Identity theft)
•Private Investigators (spying)
•Government Agencies (spying)
After a successful attack we can achieve:
●Travelers “profiling” without authorized access to Airport Data
●With enough data collected we can categorize travelers per:
● Destination (ex. Who travelled from Greece to Germany in the last
month)
● Company (ex. All Aegean passengers)
● Class (ex. Who is travelling 1rst class OR Business)
● Flight/Date (ex. All passengers of a specific flight)
● Combination of the above
POS Systems Present
What are the possible POS Systems of interest?
- Check-in kiosks
- Purchase WiFi time kiosks
- Internet Access Points (Terminals)
- Luggage Locator kiosks
Case Study: An International
Airport in Greece
Lets talk numbers (rough estimation):
Estimated travelers per year: 12 million
Business Passengers (30%): 3,6 million
Business Passengers Using POS (1%): 36000
January-March 2014, Passenger traffic reached 2.4 million
Purchase WiFi time kiosks
• Buy extra WiFi time
(accepts coins and bills,
gives change)
• Check flight details
(Barcode/QR scanner)
• Make Internet phone
calls (VOIP) (Webcam
available)
• Placement: 6 in number
located in high
accessible location
throughout the airport
Kiosk Services: Buy Wifi
Kiosk Services: VOIP calls
Purchase WiFi time kiosks: Attack
• Escape interface and expose machine details:
• OS: Windows 7
• No antivirus
• Internet Connection
• Administrative modules (proxy)
• USB enabled
• Useful for installing homemade POS malware direclty
The ALT+TAB attack ;)
• Escaping the restrictive POS Interface
• Keyboard input sanitization failure
• Left Alt + tab -> locked
• Right Alt + tab -> works!!!
USB Port accessible
USB port exposed/active
Exposing administrative modules
• Bad sanitization of user input from keyboard
• Basic Windows commands can be issued from keyboard
in order to switch view to administrative interface
• Administrative interface enabled with full privileges
directly issuing hardware commands
• Like for example the PAY command ;)
• Other Commands:
• Status
• Start/Stop
• Set Override
Admin interface #1
Admin interface #2
TOTAL: 736 Euros in coins
Admin interface #3
Paying Ourselves Through Admin Module
Informing the Airport
March, 2014
• Presentation of the attacks to
Administration, IT and Security
team of the Airport.
• Real life example: Cashing out
Money!
• A month later
The ALT+TAB bug was fixed and the
USB port was protected.
BUT the System was still vulnerable after the patch_
USB port Secured
New attack Vectors
Looking for new attack vectors to make the system
crash and expose the underlying admin
interface_
But how?
-Full Interface Testing
-Barcode Fuzzing (We need a Tool)
Interface Testing
• Exposing The Administrative interface by causing the
app to try to connect to the Internet.
• A Pop Up connection blocker causes the interface to
expose the minimized Admin Interface Window.
Click causing popup action
Admin Interface Exposed
Focus Loss
Exposed Minimized Window
Admin process running
Back to the Lab
The Need:
Develop a malware to install in the kiosk that:
• Exploits the WebCam Module
• Has RAM scrapping functionality
• Get scanned e-ticket details
• Receives Bar Code Commands
Develop a tool that:
• Fuzzes the barcode scanner to expose errors.
• Provide commands to our malware.
Outcome:
• Inspiration for the Travelers Spy (TS) POS malware
• Creation of the Aztec Revenge Tool (Android Mobile App)
Camera Module Exploitation
WHY?
1. “Eyes” inside the Airport.
(Multiple Spots, Requires Connect Back)
2. Capture Users Facial Image without consent
during ticket scan event. (“full profiling”)
Barcode Scanner + Privacy
Issues
• Barcode scans e-tickets and retrieves
travelers details
• Doesn’t log scans
• Scanned barcode info decoded and
present in RAM
• Network calls containing travelers
information
• Ticket formats tested:
BCBP (bar-coded boarding pass)
Aztec (popular with E-tickets)
BCBP Code Technical Info
• General Info
– Bar Coded Boarding Pass
– IATA, 2005
– Used by more than 200
airlines (36 use mobile)
– In Paper: PDF417
– Digital: Aztec code,
Datamatrix and QR code
PDF417 Technical Info
• Portable Data File,1991
• ISO standard 15438
• 417 each pattern consists of 4
bars and spaces, each pattern is 17 units long.
• Linear barcode
• Use in:
– Transportation
– Identification cards
– Inventory management
BCBP (PDF417) Code Decoded Info
RAW DATA:
M1ZACHARIS/ALEXANDROS E5YBG6J ATHIOAA3 0166 136Y020D0025 147>218 W B 29
M1: Format code ‘M’ and 1 leg on the boarding pass.
ZACHARIS/ALEXANDROS: Passenger Name.
E5YBG6J : My booking reference.
ATHIOAA3 : Flying from ATH (Athens) to IOA (Ioannina) on A3 (Airplane Company: Aegean)
0166 : Flight number 166.
136: The Julian date.
Y: Cabin – Economy in this case. Others including F (First) and J (Business).
020D: Passengers seat.
0025: Sequence number. In this case passenger was the 25th person to check-in.
147: Field size of airline specific data message.
>:Beginning of the version number
2: The version number.
18: Field size of another variable field.
W: check-in source.
B: Airline designator of boarding pass issuer.
29: Airline specific data
Aztec Code Technical Info
• 2D barcode, 1995
• ISO/IEC 24778:2008
• 1914 bytes of data encoded
• Use in transportation, especially E-
tickets
• Present in Mobile Phones, handheld
devices.
BCBP Aztec Code Decoded Info
M1ZACHARIS/ALEXANDROS4AEHBT ATHIOAA3 0160 117Y017A0052 100
M1: Format code ‘M’ and 1 leg on the boarding pass.
ZACHARIS/ALEXANDROS: Passenger Name.
4AEHBT: My booking reference.
ATHIOAA3: Flying from ATH (Athens) to IOA (Ioannina) on A3 (Airplane Company: Aegean)
0160: Flight number 160.
117: The Julian date. In this case 117 is April 27.
Y: Cabin – Economy in this case. Others including F (First) and J (Business).
017A: Passengers seat.
0052: Sequence number. In this case passenger was the 52th person to check-in.
100: Field size of airline specific data message.
Attack: Duplicate E-Ticket
Original QR Duplicate QR
M1ZACHARIS/ALEXANDROS4
AEHBT ATHIOAA3 0160
117Y017A0052 100
Decoded Info
• We need a tool to ex-filtrate e-tickets. (TS POS Malware)
• We need a tool for fast e-ticket duplication after we retrieve
the data for the hacked machine (AztecRevengeTool)
• Use the cloned e-ticket to impersonate someone else and
gain access to the Tax Free area of the Airport.
Scanned in
kiosk
Present in
kiosks RAM
KIOSK
Insert POS
Malware
Ex-filtrate
e-ticket
TS POS Malware
Travelers Spy (TS) POS
malware
Based on our Use Case TS-POS malware should feature
the following capabilities:
• Running on background
• Perform Ram Scrapping to identify E-tickets Already
Scanned.
• On E-ticket scan event, Captures Image through
Webcam
• Hook on Barcode Scanner Process (if possible)
• Receive Commands through Aztec Code images
when proper format bits are encoded in the image.
• Connect Back if Internet connectivity available.
Image Capturing in action
• Hooking Barcode Scanner in order to trigger the image
Capture in Time.
• Naming the image with a Time Stamp.
• Feature is disabled by default due to major drawbacks.
Problems:
• Timing the image capture
• Correlating Images with Travelers Data
• Large number of files, Detectable
RAM Scrapping in action
RAM Scrapping Functionality:
1. Extract RAM of Barcode Scanner Proc
• Map Interesting processes, Target the browser Process too!
• Do it periodically (every two hours)
• Windows API, ReadProcessMemory function
2. Search
• String Identifiers (Unique Start, Stop Values, Fixed Size),
Regular Expressions
• Candidate Data (Store if not sure)
3. Exfiltrate Information
• Is Internet Connection Available? (In our case yes)
• If not? (Store Locally)
RAM Scrapping example
1. Dumping process memory with volatility:
volatility-2.3.1.standalone.exe -f "Clean Xp-b71adf32.vmem" -p 980
memdump -D memory/
2. Using Wingrep to locate scanned e-ticket (multiple hits):
20438: yyyyyyBBu OT5Barcode
1AyyyyyyOOu 6T5=====================================
=================Hyyyyyyu iyT5M1ZACHARIS/ALEXANDRO
S E5YBG6J ATHIOAA3 0166 136Y020D0025 147>218 W B 29
hyyyyyyiiu vT5 OdPdyaga
3. Storing Unique Values (Discarding Duplicates)
Aztec Code Command Set
• Why Use?
– Important mainly for exfiltration reasons in
case of no internet connection.
– Ask malware to present specific data
– Stop/Start extra functionality (image capturing)
– Issue network scan commands to further
infiltrate/pentest the network
Aztec Revenge Tool
Aztec commands from your phone
(Aztec Revenge Tool)
PoC Android Mobile
Supports: PDF417, Aztec Code
3 Modes of Operation:
• E-ticket Duplicator Mode
• PENTEST Mode (Fuzzer)
• Converts SQLi and web service payloads to Aztec
Code images trying to fuzz Barcode scanners
• MALWARE COMMAND Mode
• If our malware is already installed sends commands
via Aztec Code images
E-ticket Duplicator Mode
• Why Duplicate a retrieved E-ticket:
– Impersonation
– Use it as basis to fuzz parameters expected
by the system.
• How it works:
Scans An image
of the ticket in real
time and decodes
the content
Duplicating in Action
Pentest Mode (Fuzzing)
• Fuzzing E-Ticket or other
Barcode Scanners
• Fuzz Formats Supported:
– String
– Integer
– Random String
– Predefined (Sqli, Xss)
• Example Use (Airport):
E–CheckIn Device
Fuzzing in Action
Command Mode
• Useful when no
internet connectivity
available
– Dump RAM
Captures
• Issuing Commands
(Ex. Spy on a specific
traveler or group)
• Perform Network Scan
• Image Capturing
• Cash Out Money
Command Set Example
Combined Attack
“LAST SCANNED TICKET” Command
TS POS Malware Retrieves/Prints Data on Screen
Conclusion
Recommendations:
1. Use strong passwords to access POS devices
2. Keep POS software up to date
3. Use firewalls to isolate the POS production network from other
networks or the Internet
4. Employ antivirus tools
5. Limit access to the Internet from the production network
6. Disable all remote access to POS systems
7. Check software and hardware of POS as a whole, to discover more
bugs that can be used in the exploitation process
Questions?
info@census-labs.com
Census S.A.
http://census-labs.com

More Related Content

What's hot

CNIT 128 Ch 6: Mobile services and mobile Web (part 2: SAML to end)
CNIT 128 Ch 6: Mobile services and mobile Web (part 2: SAML to end)CNIT 128 Ch 6: Mobile services and mobile Web (part 2: SAML to end)
CNIT 128 Ch 6: Mobile services and mobile Web (part 2: SAML to end)
Sam Bowne
 
Web Application Penetration Testing Introduction
Web Application Penetration Testing IntroductionWeb Application Penetration Testing Introduction
Web Application Penetration Testing Introductiongbud7
 
Breaking Fraud & Bot detection solutions
Breaking Fraud & Bot detection solutionsBreaking Fraud & Bot detection solutions
Breaking Fraud & Bot detection solutions
Mayank Dhiman
 
Owasp methodologies of Security testing part1
Owasp methodologies of Security testing part1Owasp methodologies of Security testing part1
Owasp methodologies of Security testing part1
robin_bene
 
Point-Of-Sale Hacking - 2600Thailand#20
Point-Of-Sale Hacking - 2600Thailand#20Point-Of-Sale Hacking - 2600Thailand#20
Point-Of-Sale Hacking - 2600Thailand#20
Prathan Phongthiproek
 
Network penetration testing
Network penetration testingNetwork penetration testing
Network penetration testingImaginea
 
Owasp security testing methodlogies –part2
Owasp security testing methodlogies –part2Owasp security testing methodlogies –part2
Owasp security testing methodlogies –part2
robin_bene
 
CNIT 128: 6: Mobile services and mobile Web (part 1: Beginning Through OAuth)
CNIT 128: 6: Mobile services and mobile Web (part 1: Beginning Through OAuth)CNIT 128: 6: Mobile services and mobile Web (part 1: Beginning Through OAuth)
CNIT 128: 6: Mobile services and mobile Web (part 1: Beginning Through OAuth)
Sam Bowne
 
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
Positive Hack Days
 
Mobile Application Security – Effective methodology, efficient testing!
Mobile Application Security – Effective methodology, efficient testing!Mobile Application Security – Effective methodology, efficient testing!
Mobile Application Security – Effective methodology, efficient testing!
espheresecurity
 
[OPD 2019] Inter-application vulnerabilities
[OPD 2019] Inter-application vulnerabilities[OPD 2019] Inter-application vulnerabilities
[OPD 2019] Inter-application vulnerabilities
OWASP
 
iOS malware: what's the risk and how to reduce it
iOS malware: what's the risk and how to reduce itiOS malware: what's the risk and how to reduce it
iOS malware: what's the risk and how to reduce it
Cyber Security Alliance
 
Writing Secure Code – Threat Defense
Writing Secure Code – Threat DefenseWriting Secure Code – Threat Defense
Writing Secure Code – Threat Defense
amiable_indian
 
Mobile Application Pentest [Fast-Track]
Mobile Application Pentest [Fast-Track]Mobile Application Pentest [Fast-Track]
Mobile Application Pentest [Fast-Track]Prathan Phongthiproek
 
NFC: Naked Fried Chicken / Пентест NFC — вот что я люблю
NFC: Naked Fried Chicken / Пентест NFC — вот что я люблюNFC: Naked Fried Chicken / Пентест NFC — вот что я люблю
NFC: Naked Fried Chicken / Пентест NFC — вот что я люблю
Positive Hack Days
 
The New OWASP Top Ten: Let's Cut to the Chase
The New OWASP Top Ten: Let's Cut to the ChaseThe New OWASP Top Ten: Let's Cut to the Chase
The New OWASP Top Ten: Let's Cut to the Chase
Security Innovation
 
Security hole #5 application security science or quality assurance
Security hole #5 application security   science or quality assuranceSecurity hole #5 application security   science or quality assurance
Security hole #5 application security science or quality assuranceTjylen Veselyj
 
Ten Commandments of Secure Coding
Ten Commandments of Secure CodingTen Commandments of Secure Coding
Ten Commandments of Secure Coding
Mateusz Olejarka
 
Android secure coding
Android secure codingAndroid secure coding
Android secure coding
Blueinfy Solutions
 
Automation In Android & iOS Application Review
Automation In Android & iOS 	Application Review�Automation In Android & iOS 	Application Review�
Automation In Android & iOS Application Review
Blueinfy Solutions
 

What's hot (20)

CNIT 128 Ch 6: Mobile services and mobile Web (part 2: SAML to end)
CNIT 128 Ch 6: Mobile services and mobile Web (part 2: SAML to end)CNIT 128 Ch 6: Mobile services and mobile Web (part 2: SAML to end)
CNIT 128 Ch 6: Mobile services and mobile Web (part 2: SAML to end)
 
Web Application Penetration Testing Introduction
Web Application Penetration Testing IntroductionWeb Application Penetration Testing Introduction
Web Application Penetration Testing Introduction
 
Breaking Fraud & Bot detection solutions
Breaking Fraud & Bot detection solutionsBreaking Fraud & Bot detection solutions
Breaking Fraud & Bot detection solutions
 
Owasp methodologies of Security testing part1
Owasp methodologies of Security testing part1Owasp methodologies of Security testing part1
Owasp methodologies of Security testing part1
 
Point-Of-Sale Hacking - 2600Thailand#20
Point-Of-Sale Hacking - 2600Thailand#20Point-Of-Sale Hacking - 2600Thailand#20
Point-Of-Sale Hacking - 2600Thailand#20
 
Network penetration testing
Network penetration testingNetwork penetration testing
Network penetration testing
 
Owasp security testing methodlogies –part2
Owasp security testing methodlogies –part2Owasp security testing methodlogies –part2
Owasp security testing methodlogies –part2
 
CNIT 128: 6: Mobile services and mobile Web (part 1: Beginning Through OAuth)
CNIT 128: 6: Mobile services and mobile Web (part 1: Beginning Through OAuth)CNIT 128: 6: Mobile services and mobile Web (part 1: Beginning Through OAuth)
CNIT 128: 6: Mobile services and mobile Web (part 1: Beginning Through OAuth)
 
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
 
Mobile Application Security – Effective methodology, efficient testing!
Mobile Application Security – Effective methodology, efficient testing!Mobile Application Security – Effective methodology, efficient testing!
Mobile Application Security – Effective methodology, efficient testing!
 
[OPD 2019] Inter-application vulnerabilities
[OPD 2019] Inter-application vulnerabilities[OPD 2019] Inter-application vulnerabilities
[OPD 2019] Inter-application vulnerabilities
 
iOS malware: what's the risk and how to reduce it
iOS malware: what's the risk and how to reduce itiOS malware: what's the risk and how to reduce it
iOS malware: what's the risk and how to reduce it
 
Writing Secure Code – Threat Defense
Writing Secure Code – Threat DefenseWriting Secure Code – Threat Defense
Writing Secure Code – Threat Defense
 
Mobile Application Pentest [Fast-Track]
Mobile Application Pentest [Fast-Track]Mobile Application Pentest [Fast-Track]
Mobile Application Pentest [Fast-Track]
 
NFC: Naked Fried Chicken / Пентест NFC — вот что я люблю
NFC: Naked Fried Chicken / Пентест NFC — вот что я люблюNFC: Naked Fried Chicken / Пентест NFC — вот что я люблю
NFC: Naked Fried Chicken / Пентест NFC — вот что я люблю
 
The New OWASP Top Ten: Let's Cut to the Chase
The New OWASP Top Ten: Let's Cut to the ChaseThe New OWASP Top Ten: Let's Cut to the Chase
The New OWASP Top Ten: Let's Cut to the Chase
 
Security hole #5 application security science or quality assurance
Security hole #5 application security   science or quality assuranceSecurity hole #5 application security   science or quality assurance
Security hole #5 application security science or quality assurance
 
Ten Commandments of Secure Coding
Ten Commandments of Secure CodingTen Commandments of Secure Coding
Ten Commandments of Secure Coding
 
Android secure coding
Android secure codingAndroid secure coding
Android secure coding
 
Automation In Android & iOS Application Review
Automation In Android & iOS 	Application Review�Automation In Android & iOS 	Application Review�
Automation In Android & iOS Application Review
 

Viewers also liked

Network Forensics and Practical Packet Analysis
Network Forensics and Practical Packet AnalysisNetwork Forensics and Practical Packet Analysis
Network Forensics and Practical Packet Analysis
Priyanka Aash
 
Defcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internetDefcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internet
Priyanka Aash
 
Defcon 22-david-wyde-client-side-http-cookie-security
Defcon 22-david-wyde-client-side-http-cookie-securityDefcon 22-david-wyde-client-side-http-cookie-security
Defcon 22-david-wyde-client-side-http-cookie-securityPriyanka Aash
 
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malwareDefcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Priyanka Aash
 
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteliDefcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Priyanka Aash
 
Risk Analysis using open FAIR and Adoption of right Security Controls
Risk Analysis using open FAIR and Adoption of right Security ControlsRisk Analysis using open FAIR and Adoption of right Security Controls
Risk Analysis using open FAIR and Adoption of right Security Controls
Priyanka Aash
 
Practical Applications of Block Chain Technologies
Practical Applications of Block Chain Technologies Practical Applications of Block Chain Technologies
Practical Applications of Block Chain Technologies
Priyanka Aash
 
Defcon 22-deviant-ollam-and-howard-payne-elevator hacking-fr
Defcon 22-deviant-ollam-and-howard-payne-elevator hacking-frDefcon 22-deviant-ollam-and-howard-payne-elevator hacking-fr
Defcon 22-deviant-ollam-and-howard-payne-elevator hacking-fr
Priyanka Aash
 
Defcon 22-jesus-molina-learn-how-to-control-every-room
Defcon 22-jesus-molina-learn-how-to-control-every-roomDefcon 22-jesus-molina-learn-how-to-control-every-room
Defcon 22-jesus-molina-learn-how-to-control-every-room
Priyanka Aash
 
Defcon 22-paul-mcmillan-attacking-the-iot-using-timing-attac
Defcon 22-paul-mcmillan-attacking-the-iot-using-timing-attacDefcon 22-paul-mcmillan-attacking-the-iot-using-timing-attac
Defcon 22-paul-mcmillan-attacking-the-iot-using-timing-attac
Priyanka Aash
 
Defcon 22-phil-polstra-cyber-hijacking-airplanes-truth-or-fi
Defcon 22-phil-polstra-cyber-hijacking-airplanes-truth-or-fiDefcon 22-phil-polstra-cyber-hijacking-airplanes-truth-or-fi
Defcon 22-phil-polstra-cyber-hijacking-airplanes-truth-or-fi
Priyanka Aash
 
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phonesDefcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phonesPriyanka Aash
 
Defcon 22-cesar-cerrudo-hacking-traffic-control-systems
Defcon 22-cesar-cerrudo-hacking-traffic-control-systemsDefcon 22-cesar-cerrudo-hacking-traffic-control-systems
Defcon 22-cesar-cerrudo-hacking-traffic-control-systems
Priyanka Aash
 
Defcon 22-adrian-crenshaw-dropping-docs-on-darknets-how-peop
Defcon 22-adrian-crenshaw-dropping-docs-on-darknets-how-peopDefcon 22-adrian-crenshaw-dropping-docs-on-darknets-how-peop
Defcon 22-adrian-crenshaw-dropping-docs-on-darknets-how-peop
Priyanka Aash
 
Defcon 22-philip-young-from-root-to-special-hacking-ibm-main
Defcon 22-philip-young-from-root-to-special-hacking-ibm-mainDefcon 22-philip-young-from-root-to-special-hacking-ibm-main
Defcon 22-philip-young-from-root-to-special-hacking-ibm-main
Priyanka Aash
 
Defcon 22-rmellendick-dakahuna-rf-penetration-testing-your-a
Defcon 22-rmellendick-dakahuna-rf-penetration-testing-your-aDefcon 22-rmellendick-dakahuna-rf-penetration-testing-your-a
Defcon 22-rmellendick-dakahuna-rf-penetration-testing-your-a
Priyanka Aash
 
Defcon 22-anton-sapozhnikov-acquire-current-user-hashes-with
Defcon 22-anton-sapozhnikov-acquire-current-user-hashes-withDefcon 22-anton-sapozhnikov-acquire-current-user-hashes-with
Defcon 22-anton-sapozhnikov-acquire-current-user-hashes-with
Priyanka Aash
 
Keynote Session : The Non - Evolution of Security
Keynote Session : The Non - Evolution of SecurityKeynote Session : The Non - Evolution of Security
Keynote Session : The Non - Evolution of Security
Priyanka Aash
 
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Priyanka Aash
 
Keynote Session : Emerging Healthcare Tech & Future Security Impact
Keynote Session : Emerging Healthcare Tech & Future Security ImpactKeynote Session : Emerging Healthcare Tech & Future Security Impact
Keynote Session : Emerging Healthcare Tech & Future Security Impact
Priyanka Aash
 

Viewers also liked (20)

Network Forensics and Practical Packet Analysis
Network Forensics and Practical Packet AnalysisNetwork Forensics and Practical Packet Analysis
Network Forensics and Practical Packet Analysis
 
Defcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internetDefcon 22-metacortex-grifter-darkside-of-the-internet
Defcon 22-metacortex-grifter-darkside-of-the-internet
 
Defcon 22-david-wyde-client-side-http-cookie-security
Defcon 22-david-wyde-client-side-http-cookie-securityDefcon 22-david-wyde-client-side-http-cookie-security
Defcon 22-david-wyde-client-side-http-cookie-security
 
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malwareDefcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
 
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteliDefcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
 
Risk Analysis using open FAIR and Adoption of right Security Controls
Risk Analysis using open FAIR and Adoption of right Security ControlsRisk Analysis using open FAIR and Adoption of right Security Controls
Risk Analysis using open FAIR and Adoption of right Security Controls
 
Practical Applications of Block Chain Technologies
Practical Applications of Block Chain Technologies Practical Applications of Block Chain Technologies
Practical Applications of Block Chain Technologies
 
Defcon 22-deviant-ollam-and-howard-payne-elevator hacking-fr
Defcon 22-deviant-ollam-and-howard-payne-elevator hacking-frDefcon 22-deviant-ollam-and-howard-payne-elevator hacking-fr
Defcon 22-deviant-ollam-and-howard-payne-elevator hacking-fr
 
Defcon 22-jesus-molina-learn-how-to-control-every-room
Defcon 22-jesus-molina-learn-how-to-control-every-roomDefcon 22-jesus-molina-learn-how-to-control-every-room
Defcon 22-jesus-molina-learn-how-to-control-every-room
 
Defcon 22-paul-mcmillan-attacking-the-iot-using-timing-attac
Defcon 22-paul-mcmillan-attacking-the-iot-using-timing-attacDefcon 22-paul-mcmillan-attacking-the-iot-using-timing-attac
Defcon 22-paul-mcmillan-attacking-the-iot-using-timing-attac
 
Defcon 22-phil-polstra-cyber-hijacking-airplanes-truth-or-fi
Defcon 22-phil-polstra-cyber-hijacking-airplanes-truth-or-fiDefcon 22-phil-polstra-cyber-hijacking-airplanes-truth-or-fi
Defcon 22-phil-polstra-cyber-hijacking-airplanes-truth-or-fi
 
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phonesDefcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
Defcon 22-fatih-ozavci-vo ip-wars-attack-of-the-cisco-phones
 
Defcon 22-cesar-cerrudo-hacking-traffic-control-systems
Defcon 22-cesar-cerrudo-hacking-traffic-control-systemsDefcon 22-cesar-cerrudo-hacking-traffic-control-systems
Defcon 22-cesar-cerrudo-hacking-traffic-control-systems
 
Defcon 22-adrian-crenshaw-dropping-docs-on-darknets-how-peop
Defcon 22-adrian-crenshaw-dropping-docs-on-darknets-how-peopDefcon 22-adrian-crenshaw-dropping-docs-on-darknets-how-peop
Defcon 22-adrian-crenshaw-dropping-docs-on-darknets-how-peop
 
Defcon 22-philip-young-from-root-to-special-hacking-ibm-main
Defcon 22-philip-young-from-root-to-special-hacking-ibm-mainDefcon 22-philip-young-from-root-to-special-hacking-ibm-main
Defcon 22-philip-young-from-root-to-special-hacking-ibm-main
 
Defcon 22-rmellendick-dakahuna-rf-penetration-testing-your-a
Defcon 22-rmellendick-dakahuna-rf-penetration-testing-your-aDefcon 22-rmellendick-dakahuna-rf-penetration-testing-your-a
Defcon 22-rmellendick-dakahuna-rf-penetration-testing-your-a
 
Defcon 22-anton-sapozhnikov-acquire-current-user-hashes-with
Defcon 22-anton-sapozhnikov-acquire-current-user-hashes-withDefcon 22-anton-sapozhnikov-acquire-current-user-hashes-with
Defcon 22-anton-sapozhnikov-acquire-current-user-hashes-with
 
Keynote Session : The Non - Evolution of Security
Keynote Session : The Non - Evolution of SecurityKeynote Session : The Non - Evolution of Security
Keynote Session : The Non - Evolution of Security
 
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
 
Keynote Session : Emerging Healthcare Tech & Future Security Impact
Keynote Session : Emerging Healthcare Tech & Future Security ImpactKeynote Session : Emerging Healthcare Tech & Future Security Impact
Keynote Session : Emerging Healthcare Tech & Future Security Impact
 

Similar to Defcon 22-alex zacharis-nikolaos-tsagkarakis-po s-attacking-t

Cant touch this: cloning any Android HCE contactless card
Cant touch this: cloning any Android HCE contactless cardCant touch this: cloning any Android HCE contactless card
Cant touch this: cloning any Android HCE contactless card
Slawomir Jasek
 
Cybercrime
CybercrimeCybercrime
Cybercrime
deepika28g
 
POS Malware: Is your Debit/Credit Transcations Secure?
POS Malware: Is your Debit/Credit Transcations Secure?POS Malware: Is your Debit/Credit Transcations Secure?
POS Malware: Is your Debit/Credit Transcations Secure?
Cysinfo Cyber Security Community
 
Inside .NET Smart Card Operating System
Inside .NET Smart Card Operating SystemInside .NET Smart Card Operating System
Inside .NET Smart Card Operating System
SensePost
 
1 List the benefits of AI devices to travelers 2 List the.pdf
1 List the benefits of AI devices to travelers 2 List the.pdf1 List the benefits of AI devices to travelers 2 List the.pdf
1 List the benefits of AI devices to travelers 2 List the.pdf
indiapower2
 
End of Studies project: Malware Repsonse Center
End of Studies project: Malware Repsonse CenterEnd of Studies project: Malware Repsonse Center
End of Studies project: Malware Repsonse Center
Abdessabour Arous
 
Biometry Presentation in Riga, Werner Blessing
Biometry Presentation in Riga, Werner BlessingBiometry Presentation in Riga, Werner Blessing
Biometry Presentation in Riga, Werner BlessingMobileMonday Estonia
 
17-Android.pptx
17-Android.pptx17-Android.pptx
17-Android.pptx
PRANAVKUMAR699137
 
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
Rapid7
 
BlackHat 2014 - xsssniper
BlackHat 2014 - xsssniperBlackHat 2014 - xsssniper
BlackHat 2014 - xsssniper
Viyat Bhalodia
 
Digital Signage Systems - The Modern Hacker's Outreach
Digital Signage Systems - The Modern Hacker's OutreachDigital Signage Systems - The Modern Hacker's Outreach
Digital Signage Systems - The Modern Hacker's Outreach
Zero Science Lab
 
Leave ATM Forever Alone
Leave ATM Forever AloneLeave ATM Forever Alone
Leave ATM Forever Alone
Olga Kochetova
 
Best Industrial Automation Software Development In India
Best Industrial Automation Software Development In IndiaBest Industrial Automation Software Development In India
Best Industrial Automation Software Development In India
DreamSoft IT Solutions Pvt. Ltd.
 
Revisiting atm vulnerabilities for our fun and vendor’s
Revisiting atm vulnerabilities for our fun and vendor’sRevisiting atm vulnerabilities for our fun and vendor’s
Revisiting atm vulnerabilities for our fun and vendor’s
Olga Kochetova
 
Automated production of predetermined digital evidence
Automated production of predetermined digital evidenceAutomated production of predetermined digital evidence
Automated production of predetermined digital evidence
Animesh Lochan
 
CONFidence 2017: Hacking Card Emulation - how to clone any Android HCE contac...
CONFidence 2017: Hacking Card Emulation - how to clone any Android HCE contac...CONFidence 2017: Hacking Card Emulation - how to clone any Android HCE contac...
CONFidence 2017: Hacking Card Emulation - how to clone any Android HCE contac...
PROIDEA
 
SMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactionsSMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactions
IJRES Journal
 
cyber forensics
cyber forensicscyber forensics
cyber forensics
Ambuj Kumar
 
Airport IT&T 2013 Panel Discussion
Airport IT&T 2013 Panel DiscussionAirport IT&T 2013 Panel Discussion
Airport IT&T 2013 Panel DiscussionRussell Publishing
 
How to build corporate size fraud prevention
How to build corporate size fraud preventionHow to build corporate size fraud prevention
How to build corporate size fraud prevention
Yury Leonychev
 

Similar to Defcon 22-alex zacharis-nikolaos-tsagkarakis-po s-attacking-t (20)

Cant touch this: cloning any Android HCE contactless card
Cant touch this: cloning any Android HCE contactless cardCant touch this: cloning any Android HCE contactless card
Cant touch this: cloning any Android HCE contactless card
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
POS Malware: Is your Debit/Credit Transcations Secure?
POS Malware: Is your Debit/Credit Transcations Secure?POS Malware: Is your Debit/Credit Transcations Secure?
POS Malware: Is your Debit/Credit Transcations Secure?
 
Inside .NET Smart Card Operating System
Inside .NET Smart Card Operating SystemInside .NET Smart Card Operating System
Inside .NET Smart Card Operating System
 
1 List the benefits of AI devices to travelers 2 List the.pdf
1 List the benefits of AI devices to travelers 2 List the.pdf1 List the benefits of AI devices to travelers 2 List the.pdf
1 List the benefits of AI devices to travelers 2 List the.pdf
 
End of Studies project: Malware Repsonse Center
End of Studies project: Malware Repsonse CenterEnd of Studies project: Malware Repsonse Center
End of Studies project: Malware Repsonse Center
 
Biometry Presentation in Riga, Werner Blessing
Biometry Presentation in Riga, Werner BlessingBiometry Presentation in Riga, Werner Blessing
Biometry Presentation in Riga, Werner Blessing
 
17-Android.pptx
17-Android.pptx17-Android.pptx
17-Android.pptx
 
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
 
BlackHat 2014 - xsssniper
BlackHat 2014 - xsssniperBlackHat 2014 - xsssniper
BlackHat 2014 - xsssniper
 
Digital Signage Systems - The Modern Hacker's Outreach
Digital Signage Systems - The Modern Hacker's OutreachDigital Signage Systems - The Modern Hacker's Outreach
Digital Signage Systems - The Modern Hacker's Outreach
 
Leave ATM Forever Alone
Leave ATM Forever AloneLeave ATM Forever Alone
Leave ATM Forever Alone
 
Best Industrial Automation Software Development In India
Best Industrial Automation Software Development In IndiaBest Industrial Automation Software Development In India
Best Industrial Automation Software Development In India
 
Revisiting atm vulnerabilities for our fun and vendor’s
Revisiting atm vulnerabilities for our fun and vendor’sRevisiting atm vulnerabilities for our fun and vendor’s
Revisiting atm vulnerabilities for our fun and vendor’s
 
Automated production of predetermined digital evidence
Automated production of predetermined digital evidenceAutomated production of predetermined digital evidence
Automated production of predetermined digital evidence
 
CONFidence 2017: Hacking Card Emulation - how to clone any Android HCE contac...
CONFidence 2017: Hacking Card Emulation - how to clone any Android HCE contac...CONFidence 2017: Hacking Card Emulation - how to clone any Android HCE contac...
CONFidence 2017: Hacking Card Emulation - how to clone any Android HCE contac...
 
SMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactionsSMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactions
 
cyber forensics
cyber forensicscyber forensics
cyber forensics
 
Airport IT&T 2013 Panel Discussion
Airport IT&T 2013 Panel DiscussionAirport IT&T 2013 Panel Discussion
Airport IT&T 2013 Panel Discussion
 
How to build corporate size fraud prevention
How to build corporate size fraud preventionHow to build corporate size fraud prevention
How to build corporate size fraud prevention
 

More from Priyanka Aash

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Priyanka Aash
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
Priyanka Aash
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
Priyanka Aash
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
Priyanka Aash
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
Priyanka Aash
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
Priyanka Aash
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
Priyanka Aash
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Priyanka Aash
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
Priyanka Aash
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
Priyanka Aash
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
Priyanka Aash
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
Priyanka Aash
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
Priyanka Aash
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Priyanka Aash
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Priyanka Aash
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Priyanka Aash
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
Priyanka Aash
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Priyanka Aash
 

More from Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Defcon 22-alex zacharis-nikolaos-tsagkarakis-po s-attacking-t

  • 1. Attacking the Traveling Salesman Point-of-sale attacks on airline travelers DEFCON 2014 Alex Zacharis Nikos Tsagkarakis info@census-labs.com Census S.A. http://census-labs.com/
  • 2. Contents • Why target travelers? • Point-of-Sale attacks in transportation • Case Study • Back to the Lab • POS: exploiting different modules • Cameras everywhere • Scan that QR • RAM scrapping • TS POS Malware • Aztec Revenge Tool
  • 3. Why target travelers? ● The need for communication is greater than privacy and/or security ● The unknown Internet access landscape forces you to trust what you normally wouldn’t • WiFi: • Login to (corporate) email accounts • Login to social networks • Carry mobile phones, tablets, laptops ,usually all on at the same time ;) • No second thoughts about public Internet hotspots
  • 4. Point-of-Sale attacks in Transportation Unlike traditional POS attacks in Commerce (ex. Target Incident): • Credit card details • Web credentials We target International Travelers' information: • Name • Picture • Flight number • Destination • Seat number • Communication partners • Other_.
  • 5. How is the POS introduced As in every known POS Attack (Retail, Healthcare, etc): 1. The system may have unpatched vulnerabilities 2. An employee of the victim company may introduce it by mistake (opening an email attachment containing malware) 3. The source might even be an employee looking to cause trouble.
  • 6. POS attack outcome Who benefits? •Cyber Criminals (Identity theft) •Private Investigators (spying) •Government Agencies (spying) After a successful attack we can achieve: ●Travelers “profiling” without authorized access to Airport Data ●With enough data collected we can categorize travelers per: ● Destination (ex. Who travelled from Greece to Germany in the last month) ● Company (ex. All Aegean passengers) ● Class (ex. Who is travelling 1rst class OR Business) ● Flight/Date (ex. All passengers of a specific flight) ● Combination of the above
  • 7. POS Systems Present What are the possible POS Systems of interest? - Check-in kiosks - Purchase WiFi time kiosks - Internet Access Points (Terminals) - Luggage Locator kiosks
  • 8. Case Study: An International Airport in Greece Lets talk numbers (rough estimation): Estimated travelers per year: 12 million Business Passengers (30%): 3,6 million Business Passengers Using POS (1%): 36000 January-March 2014, Passenger traffic reached 2.4 million
  • 9. Purchase WiFi time kiosks • Buy extra WiFi time (accepts coins and bills, gives change) • Check flight details (Barcode/QR scanner) • Make Internet phone calls (VOIP) (Webcam available) • Placement: 6 in number located in high accessible location throughout the airport
  • 12. Purchase WiFi time kiosks: Attack • Escape interface and expose machine details: • OS: Windows 7 • No antivirus • Internet Connection • Administrative modules (proxy) • USB enabled • Useful for installing homemade POS malware direclty
  • 13. The ALT+TAB attack ;) • Escaping the restrictive POS Interface • Keyboard input sanitization failure • Left Alt + tab -> locked • Right Alt + tab -> works!!!
  • 14. USB Port accessible USB port exposed/active
  • 15. Exposing administrative modules • Bad sanitization of user input from keyboard • Basic Windows commands can be issued from keyboard in order to switch view to administrative interface • Administrative interface enabled with full privileges directly issuing hardware commands • Like for example the PAY command ;) • Other Commands: • Status • Start/Stop • Set Override
  • 17. Admin interface #2 TOTAL: 736 Euros in coins
  • 18. Admin interface #3 Paying Ourselves Through Admin Module
  • 19. Informing the Airport March, 2014 • Presentation of the attacks to Administration, IT and Security team of the Airport. • Real life example: Cashing out Money! • A month later The ALT+TAB bug was fixed and the USB port was protected. BUT the System was still vulnerable after the patch_ USB port Secured
  • 20. New attack Vectors Looking for new attack vectors to make the system crash and expose the underlying admin interface_ But how? -Full Interface Testing -Barcode Fuzzing (We need a Tool)
  • 21. Interface Testing • Exposing The Administrative interface by causing the app to try to connect to the Internet. • A Pop Up connection blocker causes the interface to expose the minimized Admin Interface Window. Click causing popup action
  • 22. Admin Interface Exposed Focus Loss Exposed Minimized Window Admin process running
  • 23. Back to the Lab The Need: Develop a malware to install in the kiosk that: • Exploits the WebCam Module • Has RAM scrapping functionality • Get scanned e-ticket details • Receives Bar Code Commands Develop a tool that: • Fuzzes the barcode scanner to expose errors. • Provide commands to our malware. Outcome: • Inspiration for the Travelers Spy (TS) POS malware • Creation of the Aztec Revenge Tool (Android Mobile App)
  • 24. Camera Module Exploitation WHY? 1. “Eyes” inside the Airport. (Multiple Spots, Requires Connect Back) 2. Capture Users Facial Image without consent during ticket scan event. (“full profiling”)
  • 25. Barcode Scanner + Privacy Issues • Barcode scans e-tickets and retrieves travelers details • Doesn’t log scans • Scanned barcode info decoded and present in RAM • Network calls containing travelers information • Ticket formats tested: BCBP (bar-coded boarding pass) Aztec (popular with E-tickets)
  • 26. BCBP Code Technical Info • General Info – Bar Coded Boarding Pass – IATA, 2005 – Used by more than 200 airlines (36 use mobile) – In Paper: PDF417 – Digital: Aztec code, Datamatrix and QR code
  • 27. PDF417 Technical Info • Portable Data File,1991 • ISO standard 15438 • 417 each pattern consists of 4 bars and spaces, each pattern is 17 units long. • Linear barcode • Use in: – Transportation – Identification cards – Inventory management
  • 28. BCBP (PDF417) Code Decoded Info RAW DATA: M1ZACHARIS/ALEXANDROS E5YBG6J ATHIOAA3 0166 136Y020D0025 147>218 W B 29 M1: Format code ‘M’ and 1 leg on the boarding pass. ZACHARIS/ALEXANDROS: Passenger Name. E5YBG6J : My booking reference. ATHIOAA3 : Flying from ATH (Athens) to IOA (Ioannina) on A3 (Airplane Company: Aegean) 0166 : Flight number 166. 136: The Julian date. Y: Cabin – Economy in this case. Others including F (First) and J (Business). 020D: Passengers seat. 0025: Sequence number. In this case passenger was the 25th person to check-in. 147: Field size of airline specific data message. >:Beginning of the version number 2: The version number. 18: Field size of another variable field. W: check-in source. B: Airline designator of boarding pass issuer. 29: Airline specific data
  • 29. Aztec Code Technical Info • 2D barcode, 1995 • ISO/IEC 24778:2008 • 1914 bytes of data encoded • Use in transportation, especially E- tickets • Present in Mobile Phones, handheld devices.
  • 30. BCBP Aztec Code Decoded Info M1ZACHARIS/ALEXANDROS4AEHBT ATHIOAA3 0160 117Y017A0052 100 M1: Format code ‘M’ and 1 leg on the boarding pass. ZACHARIS/ALEXANDROS: Passenger Name. 4AEHBT: My booking reference. ATHIOAA3: Flying from ATH (Athens) to IOA (Ioannina) on A3 (Airplane Company: Aegean) 0160: Flight number 160. 117: The Julian date. In this case 117 is April 27. Y: Cabin – Economy in this case. Others including F (First) and J (Business). 017A: Passengers seat. 0052: Sequence number. In this case passenger was the 52th person to check-in. 100: Field size of airline specific data message.
  • 31. Attack: Duplicate E-Ticket Original QR Duplicate QR M1ZACHARIS/ALEXANDROS4 AEHBT ATHIOAA3 0160 117Y017A0052 100 Decoded Info • We need a tool to ex-filtrate e-tickets. (TS POS Malware) • We need a tool for fast e-ticket duplication after we retrieve the data for the hacked machine (AztecRevengeTool) • Use the cloned e-ticket to impersonate someone else and gain access to the Tax Free area of the Airport. Scanned in kiosk Present in kiosks RAM KIOSK Insert POS Malware Ex-filtrate e-ticket
  • 33. Travelers Spy (TS) POS malware Based on our Use Case TS-POS malware should feature the following capabilities: • Running on background • Perform Ram Scrapping to identify E-tickets Already Scanned. • On E-ticket scan event, Captures Image through Webcam • Hook on Barcode Scanner Process (if possible) • Receive Commands through Aztec Code images when proper format bits are encoded in the image. • Connect Back if Internet connectivity available.
  • 34. Image Capturing in action • Hooking Barcode Scanner in order to trigger the image Capture in Time. • Naming the image with a Time Stamp. • Feature is disabled by default due to major drawbacks. Problems: • Timing the image capture • Correlating Images with Travelers Data • Large number of files, Detectable
  • 35. RAM Scrapping in action RAM Scrapping Functionality: 1. Extract RAM of Barcode Scanner Proc • Map Interesting processes, Target the browser Process too! • Do it periodically (every two hours) • Windows API, ReadProcessMemory function 2. Search • String Identifiers (Unique Start, Stop Values, Fixed Size), Regular Expressions • Candidate Data (Store if not sure) 3. Exfiltrate Information • Is Internet Connection Available? (In our case yes) • If not? (Store Locally)
  • 36. RAM Scrapping example 1. Dumping process memory with volatility: volatility-2.3.1.standalone.exe -f "Clean Xp-b71adf32.vmem" -p 980 memdump -D memory/ 2. Using Wingrep to locate scanned e-ticket (multiple hits): 20438: yyyyyyBBu OT5Barcode 1AyyyyyyOOu 6T5===================================== =================Hyyyyyyu iyT5M1ZACHARIS/ALEXANDRO S E5YBG6J ATHIOAA3 0166 136Y020D0025 147>218 W B 29 hyyyyyyiiu vT5 OdPdyaga 3. Storing Unique Values (Discarding Duplicates)
  • 37. Aztec Code Command Set • Why Use? – Important mainly for exfiltration reasons in case of no internet connection. – Ask malware to present specific data – Stop/Start extra functionality (image capturing) – Issue network scan commands to further infiltrate/pentest the network
  • 39. Aztec commands from your phone (Aztec Revenge Tool) PoC Android Mobile Supports: PDF417, Aztec Code 3 Modes of Operation: • E-ticket Duplicator Mode • PENTEST Mode (Fuzzer) • Converts SQLi and web service payloads to Aztec Code images trying to fuzz Barcode scanners • MALWARE COMMAND Mode • If our malware is already installed sends commands via Aztec Code images
  • 40. E-ticket Duplicator Mode • Why Duplicate a retrieved E-ticket: – Impersonation – Use it as basis to fuzz parameters expected by the system. • How it works: Scans An image of the ticket in real time and decodes the content
  • 42. Pentest Mode (Fuzzing) • Fuzzing E-Ticket or other Barcode Scanners • Fuzz Formats Supported: – String – Integer – Random String – Predefined (Sqli, Xss) • Example Use (Airport): E–CheckIn Device
  • 44. Command Mode • Useful when no internet connectivity available – Dump RAM Captures • Issuing Commands (Ex. Spy on a specific traveler or group) • Perform Network Scan • Image Capturing • Cash Out Money Command Set Example
  • 45. Combined Attack “LAST SCANNED TICKET” Command TS POS Malware Retrieves/Prints Data on Screen
  • 46. Conclusion Recommendations: 1. Use strong passwords to access POS devices 2. Keep POS software up to date 3. Use firewalls to isolate the POS production network from other networks or the Internet 4. Employ antivirus tools 5. Limit access to the Internet from the production network 6. Disable all remote access to POS systems 7. Check software and hardware of POS as a whole, to discover more bugs that can be used in the exploitation process