SlideShare a Scribd company logo
1
TECHNICAL GUIDELINES ON
How to Secure a POS System from
Hackers
By:
Syed Ubaid Ali Jafri
Information Security Professional
LinkedIn: https://pk.linkedin.com/in/ubaidjafri
2
Contents
Background..............................................................................................................................................................................................................3
Objective..................................................................................................................................................................................................................3
Testing Type .............................................................................................................................................................................................................3
TOP 15 Controls Checklist..........................................................................................................................................................................................4
POS Checklist............................................................................................................................................................................................................7
References................................................................................................................................................................................................................8
3
Background
The payment terminals we are talking about are tamper proof. They usually have Ethernet connectivity, and a serial line. The interface open to normal user is the card
slot and PIN pad, and in some occasions contactless reader. The actual configuration does vary between models and vendors, but the basic idea is that the terminal
initiates all the connections and doesn't listen to anything incoming.
Objective
Our objective for publishing this document is to ensure technically that the initial security up to a level where POS should be secure from basic attacks.
Testing Type
This testing involves the Physical layer to Presentation Layer testing which includes the following controls but not limited to
S.No Control Name
1 Insecure Physical Connectivity
2 IP/MAC Address Spoofing
3 Weak or Default credentials on Device
4 Insecure Communication Protocol
5 Unencrypted Data Travelling
6 Insecure Data Storage
7 Sensitive Information Disclosure
8 Shared File Enumeration
9 Stress testing of PoS Machine
10 Inadequate Transaction Handling
11 Un-necessary services/Ports open
12 Absence of Audit Logging
13 Missing Patches
14 SNMP public community string
15 SSL/TLS Configuration Weaknesses
4
TOP 15 Controls Checklist
Summary Sheet of Controls
S. No Control Name Control Description Severity Impact
1 Physical Connectivity of PoS
The Network connectivity of of PoS device
whether the device is connected with
Wireless Router or with LAN Switch. Ensure
that no other user is able to connect to the
same Wifi or LAN Network
High
An attacker or malicious user with local
network access is able to plug their
infected machine with the network
connected to a PoS system, An attacker
would be able to sniff or capture the data
on the network. An attacker can easily
perform a MiTM attack against this
connectivity,
2 IP/MAC Address Spoofing
A network attacker can use a protocol
analyzer to know a valid MAC address, By
examining the MAC Address, An Attacker is
able to spoofed the IP/MAC Address of the
POS Machine
High
An attacker can easily steal the identity of
the device, an attacker can perform the
malicious activity by showing the
legitimate device identity which doesn’t
belong to them.
3 Weak or Default credentials on Device
Device is using the default username or
password for hardware administration
High
An attacker or malicious user is able to
perform modification by using the default
credentials on device, an attacker is able
to change or modify the hardware
configurations on device.
4 Insecure Communication Protocol
Device is using the weak protocols (FTP,
Telnet, VNC, RDP) for remote administration
which could lead towards confidentiality,
intigrity , availability attack
High
An attacker or malicious user, with local
network access, is able to perform a Man-
in-the-Middle attack (MITM) and can see
all communication between the POS and
the FTP server on the. Using a username
and password obtained by passively
sniffing traffic on the network, the attacker
can connect to the FTP server, download,
modify, and then upload arbitrary files
5 Unencrypted Data Travelling
Device is able to send data unencrypted on
Wifi/LAN channel
High
An Attacker or malicious user, with local
network access, is able to perform a
sniffing attack on Wi-Fi/LAN Network.
Capturing the unencrypted traffic contains
the sensitive information of (Usernames,
Password, accounts information)
5
6 Insecure Data Storage
Device is able to store the data on Memory
card or in the device itself
High
An attacker is able to copy all the stored
data on the machine or in the memory
card, which could help an attacker to
generate the fake card of original values
stored in the device or memory card, by
using different strip card reader writer
machines.
7 Sensitive Information Disclosure
Device is capable to exposing the sensitive
data which contains (Track 1 record, Track 2
record and CVV Number of customer
High
An attacker is able to read or sniff the
Track-1, Track-2 Data of customer which
could impact towards fake card
generation or online sale purchasing of
goods.
8 Shared File Enumeration
Device has multiple open folders that are
shared and has access to the root directory
directly
High
This may directly lead to system
compromise by allowing modification of
system files.
9 Stress Testing of Pos Terminal
The device is not capable for handling huge
load on the network, the devices is able to
randomly shut down and restart ports on the
network switches/routers that connect the
servers (via SNMP commands for example),
double the baseline number for concurrent
users/HTTP connections
High
An attacker using less skills can perform
the attacker on the system which could
lead towards availability attack.
10 Inadequate Transaction Handling
An attacker is able to retrieve the
configuration information from the Server, the
authentication takes place in plaintext over
the local network, and all the transactions are
shown in plaintext in the text file.
High
An attacker can perform the Man-in-the-
Middle attack and can change the price
value, modify the items and their date.
11 Un-necessary services/Ports open
There are multiple ports that are open and not
being used on the device
Medium
By using unused port an attacker can
perform a brute force attack or sending
the SYN request to the terminal machine
which could lead towards availability
attack.
6
12 Absence of Audit Logging
Device is not able to record the logs of
(Logged in, Transactions, Network
Connectivity)
Medium
Due to absence of Audit Logging, An
attacker can easily perform malicious
activities and hide their tracks.
13 Missing Patches
Critical Microsoft security patches were not
installed on the PoS Sytem. The missing
patches address vulnerabilities which may
allow unauthenticated remote code execution,
privilege escalation, denial of service, and
confidential information disclosure
Medium
An attacker or malicious user with
network access may be able to view
sensitive information, cause Denial-of-
Service, or execute arbitrary code. An
attacker with local access to the hosts
may be able to escalate their privileges
up to the administrator level.
14 SNMP public community string
Simple Network Management Protocol
(SNMP) community string ‘public’ is used on
the PoS Machine, granting READ-ONLY
access to information on remote hosts. SNMP
is generally used for system and network
monitoring purposes. Typically, a remote
network management server queries a
remote SNMP agent (residing on the target
system) for system status, by supplying a
community string for authentication.
Medium
An attacker or malicious user is able to
use the default SNMP community string
to discover detailed device metadata and
network configuration details, which can
assist in other attacks. The information
disclosed includes the operating system
version, a list of users on the system, a
list of installed software, any enabled
network interfaces, routing information, as
well as any open TCP connections.
15 SSL/TLS Configuration Weaknesses
Secure Sockets Layer (SSL) and Transport
Layer Security (TLS) are used in the POS
environment to protect the confidentiality and
integrity of connections to database servers,
and to the administrative web interface of the
site router. We identified the following
misconfigurations with the implementation of
SSL/TLS.
Medium
An attacker or malicious user with
network access is able to impersonate
SSL/TLS-protected services, or carry out
Man-in-The-Middle attacks, compromising
the confidentiality and integrity of
encrypted network communications.
These communications may include
sensitive business information such as
transactions and payment data, as well as
technical information such as credentials
or configuration files
7
POS Checklist
A pointof sales(POS) systems needsassessmentisessential forplanningthe selectionand deploymentof pointof salessystem. Thischecklistwillassist
indefiningsystemrequirementsandwill also provide the foundationforVulnerabilitywhichcouldbe foundinthe control,the riskassociatedwiththe
vulnerability,itsimpactanalysis,anditstechnical recommendationswhichincludes(Configurational changes,Proceduralchanges,Software/Services
changesetc.)
PoS (Point of Sale ) Information Security Checklist
S. No Control Name Control Presence Risk Description Impact Severity Recommendation
1 
2 
3 
4
5 
8
References
1 http://www.internetsociety.org/doc/addressing-challenge-ip-spoofing
2 http://www.guru99.com/testing-for-retail-pos-point-of-sale-system.html
3 https://community.hpe.com/t5/Security-Research/Hacking-POS-Terminal-for-Fun-and-Non-profit/ba-p/6540620#.WEfkGNV97IU
4 http://www.pcworld.com/article/259882/vulnerabilities_in_payment_terminals_demonstrated_at_black_hat.html
5 https://pen-testing.sans.org/blog/2014/06/12/pen-testing-payment-terminals-a-step-by-step-how-to-guide
6 http://www.slideshare.net/evilhackerz/penetration-testing-guidancemarch2015

More Related Content

What's hot

OSINT Tool - Reconnaissance with Recon-ng
OSINT Tool - Reconnaissance with Recon-ngOSINT Tool - Reconnaissance with Recon-ng
OSINT Tool - Reconnaissance with Recon-ng
Raghav Bisht
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
A Raheem Ansari
 
Tor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion Router
Mohammed Bharmal
 
Cross site scripting (xss) attacks issues and defense - by sandeep kumbhar
Cross site scripting (xss) attacks issues and defense - by sandeep kumbharCross site scripting (xss) attacks issues and defense - by sandeep kumbhar
Cross site scripting (xss) attacks issues and defense - by sandeep kumbhar
Sandeep Kumbhar
 
Deep and Dark Web
Deep and Dark WebDeep and Dark Web
Deep and Dark Web
Md. Nazmus Shakib Robin
 
8 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 20208 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 2020
SecPod Technologies
 
Penetration testing
Penetration testingPenetration testing
Penetration testing
Ammar WK
 
Port Scanning
Port ScanningPort Scanning
Port Scanning
amiable_indian
 
CREST CCT Lab Prep Notes
CREST CCT Lab Prep NotesCREST CCT Lab Prep Notes
CREST CCT Lab Prep Notes
NathanAn
 
OWASP Top 10 A4 – Insecure Direct Object Reference
OWASP Top 10 A4 – Insecure Direct Object ReferenceOWASP Top 10 A4 – Insecure Direct Object Reference
OWASP Top 10 A4 – Insecure Direct Object Reference
Narudom Roongsiriwong, CISSP
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoors
Gaurav Dalvi
 
Cross Site Scripting Defense Presentation
Cross Site Scripting Defense Presentation Cross Site Scripting Defense Presentation
Cross Site Scripting Defense Presentation
Ikhade Maro Igbape
 
Website hacking and prevention (All Tools,Topics & Technique )
Website hacking and prevention (All Tools,Topics & Technique )Website hacking and prevention (All Tools,Topics & Technique )
Website hacking and prevention (All Tools,Topics & Technique )
Jay Nagar
 
Dark web (1)
Dark web (1)Dark web (1)
Web Hacking
Web HackingWeb Hacking
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
Keshab Nath
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
SysCloud
 
Lesson 2
Lesson 2Lesson 2
Deep web
Deep webDeep web
Deep web
Abu Kaisar
 
TOR NETWORK
TOR NETWORKTOR NETWORK
TOR NETWORK
Rishikese MR
 

What's hot (20)

OSINT Tool - Reconnaissance with Recon-ng
OSINT Tool - Reconnaissance with Recon-ngOSINT Tool - Reconnaissance with Recon-ng
OSINT Tool - Reconnaissance with Recon-ng
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Tor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion Router
 
Cross site scripting (xss) attacks issues and defense - by sandeep kumbhar
Cross site scripting (xss) attacks issues and defense - by sandeep kumbharCross site scripting (xss) attacks issues and defense - by sandeep kumbhar
Cross site scripting (xss) attacks issues and defense - by sandeep kumbhar
 
Deep and Dark Web
Deep and Dark WebDeep and Dark Web
Deep and Dark Web
 
8 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 20208 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 2020
 
Penetration testing
Penetration testingPenetration testing
Penetration testing
 
Port Scanning
Port ScanningPort Scanning
Port Scanning
 
CREST CCT Lab Prep Notes
CREST CCT Lab Prep NotesCREST CCT Lab Prep Notes
CREST CCT Lab Prep Notes
 
OWASP Top 10 A4 – Insecure Direct Object Reference
OWASP Top 10 A4 – Insecure Direct Object ReferenceOWASP Top 10 A4 – Insecure Direct Object Reference
OWASP Top 10 A4 – Insecure Direct Object Reference
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoors
 
Cross Site Scripting Defense Presentation
Cross Site Scripting Defense Presentation Cross Site Scripting Defense Presentation
Cross Site Scripting Defense Presentation
 
Website hacking and prevention (All Tools,Topics & Technique )
Website hacking and prevention (All Tools,Topics & Technique )Website hacking and prevention (All Tools,Topics & Technique )
Website hacking and prevention (All Tools,Topics & Technique )
 
Dark web (1)
Dark web (1)Dark web (1)
Dark web (1)
 
Web Hacking
Web HackingWeb Hacking
Web Hacking
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Deep web
Deep webDeep web
Deep web
 
TOR NETWORK
TOR NETWORKTOR NETWORK
TOR NETWORK
 

Viewers also liked

POS System
POS SystemPOS System
POS System
Haptism
 
Open Street Map Moldova Project (sotm09)
Open Street Map Moldova Project (sotm09)Open Street Map Moldova Project (sotm09)
Open Street Map Moldova Project (sotm09)
Anatolie Golovco
 
Advantages Of SQL
Advantages Of SQL Advantages Of SQL
Advantages Of SQL
Intellipaat
 
Advantages of mis
Advantages of misAdvantages of mis
Advantages of mis
Shahi Raz Akhtar
 
Simplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USMSimplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USM
AlienVault
 
Edc Machine User Guide
Edc Machine User GuideEdc Machine User Guide
Edc Machine User GuideKoson Nontaman
 
Advantages of pl sql
Advantages of pl sqlAdvantages of pl sql
Advantages of pl sql
Intellipaat
 
Group 1 pos system
Group 1   pos systemGroup 1   pos system
Group 1 pos system
michael21120
 
Advantages And Benefits Of MIS In Your Career
Advantages And Benefits Of MIS In Your CareerAdvantages And Benefits Of MIS In Your Career
Advantages And Benefits Of MIS In Your Career
misc
 
proposal on point of sale information system of a super store
proposal on point of sale information system of a super storeproposal on point of sale information system of a super store
proposal on point of sale information system of a super store
HAMMAD AHMAD
 
Order now – restaurant management system
Order now – restaurant management systemOrder now – restaurant management system
Order now – restaurant management system
Birla Institute of Technology & Science - K.K. Birla Goa Campus
 
Restaurant Management System
Restaurant Management SystemRestaurant Management System
Restaurant Management System
Juliasmith1985
 
Network Proposal Power Point
Network Proposal Power PointNetwork Proposal Power Point
Network Proposal Power Point
guest7fbe17
 
Point of Sale (POS)
Point of Sale (POS)Point of Sale (POS)
Point of Sale (POS)
Michelle Bernardo
 
Software Requirements Specification for restaurant management system
Software Requirements Specification for restaurant management systemSoftware Requirements Specification for restaurant management system
Software Requirements Specification for restaurant management system
SM. Aurnob
 
Advantages of MIS
Advantages of MISAdvantages of MIS
Advantages of MIS
Mihir Busa
 
Advantages and Disadvantages of MIS
Advantages and Disadvantages of MISAdvantages and Disadvantages of MIS
Advantages and Disadvantages of MIS
Neeti Naag
 
Restaurant Management Systems
Restaurant Management SystemsRestaurant Management Systems
Restaurant Management Systems
Anil Bilgihan
 
Restaurent management system
Restaurent management systemRestaurent management system
Restaurent management system
Smit Patel
 

Viewers also liked (19)

POS System
POS SystemPOS System
POS System
 
Open Street Map Moldova Project (sotm09)
Open Street Map Moldova Project (sotm09)Open Street Map Moldova Project (sotm09)
Open Street Map Moldova Project (sotm09)
 
Advantages Of SQL
Advantages Of SQL Advantages Of SQL
Advantages Of SQL
 
Advantages of mis
Advantages of misAdvantages of mis
Advantages of mis
 
Simplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USMSimplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USM
 
Edc Machine User Guide
Edc Machine User GuideEdc Machine User Guide
Edc Machine User Guide
 
Advantages of pl sql
Advantages of pl sqlAdvantages of pl sql
Advantages of pl sql
 
Group 1 pos system
Group 1   pos systemGroup 1   pos system
Group 1 pos system
 
Advantages And Benefits Of MIS In Your Career
Advantages And Benefits Of MIS In Your CareerAdvantages And Benefits Of MIS In Your Career
Advantages And Benefits Of MIS In Your Career
 
proposal on point of sale information system of a super store
proposal on point of sale information system of a super storeproposal on point of sale information system of a super store
proposal on point of sale information system of a super store
 
Order now – restaurant management system
Order now – restaurant management systemOrder now – restaurant management system
Order now – restaurant management system
 
Restaurant Management System
Restaurant Management SystemRestaurant Management System
Restaurant Management System
 
Network Proposal Power Point
Network Proposal Power PointNetwork Proposal Power Point
Network Proposal Power Point
 
Point of Sale (POS)
Point of Sale (POS)Point of Sale (POS)
Point of Sale (POS)
 
Software Requirements Specification for restaurant management system
Software Requirements Specification for restaurant management systemSoftware Requirements Specification for restaurant management system
Software Requirements Specification for restaurant management system
 
Advantages of MIS
Advantages of MISAdvantages of MIS
Advantages of MIS
 
Advantages and Disadvantages of MIS
Advantages and Disadvantages of MISAdvantages and Disadvantages of MIS
Advantages and Disadvantages of MIS
 
Restaurant Management Systems
Restaurant Management SystemsRestaurant Management Systems
Restaurant Management Systems
 
Restaurent management system
Restaurent management systemRestaurent management system
Restaurent management system
 

Similar to Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hackers

Security communication
Security communicationSecurity communication
Security communication
Say Shyong
 
Top 20 cyber security interview questions and answers in 2023.pdf
Top 20 cyber security interview questions and answers in 2023.pdfTop 20 cyber security interview questions and answers in 2023.pdf
Top 20 cyber security interview questions and answers in 2023.pdf
AnanthReddy38
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
Amir Hossein Zargaran
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Prabhat kumar Suman
 
System and web security
System and web securitySystem and web security
System and web security
chirag patil
 
Top 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdfTop 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdf
infosec train
 
CNS unit -1.docx
CNS unit -1.docxCNS unit -1.docx
CNS unit -1.docx
Padamata Rameshbabu
 
Seucrity in a nutshell
Seucrity in a nutshellSeucrity in a nutshell
Seucrity in a nutshell
Yahia Kandeel
 
UNIT 5 (2).pptx
UNIT 5 (2).pptxUNIT 5 (2).pptx
UNIT 5 (2).pptx
janani603976
 
VTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesVTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notes
Jayanth Dwijesh H P
 
Network and Security-2.pptx
Network and Security-2.pptxNetwork and Security-2.pptx
Network and Security-2.pptx
Dhanvanthkesavan
 
Backdoor Entry to a Windows Computer
Backdoor Entry to a Windows ComputerBackdoor Entry to a Windows Computer
Backdoor Entry to a Windows Computer
IRJET Journal
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
Adebisi Tolulope
 
The Maple County court is redesigning its network to ensure more secu.docx
 The Maple County court is redesigning its network to ensure more secu.docx The Maple County court is redesigning its network to ensure more secu.docx
The Maple County court is redesigning its network to ensure more secu.docx
Komlin1
 
Given below is an issue that you have identified as an issue in a ret.pdf
Given below is an issue that you have identified as an issue in a ret.pdfGiven below is an issue that you have identified as an issue in a ret.pdf
Given below is an issue that you have identified as an issue in a ret.pdf
birajdar2
 
2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx
2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx
2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx
vickeryr87
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
girmawodajo
 
cybersecurity
cybersecuritycybersecurity
cybersecurity
maha797959
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
prachi67
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical Hacking
Sripati Mahapatra
 

Similar to Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hackers (20)

Security communication
Security communicationSecurity communication
Security communication
 
Top 20 cyber security interview questions and answers in 2023.pdf
Top 20 cyber security interview questions and answers in 2023.pdfTop 20 cyber security interview questions and answers in 2023.pdf
Top 20 cyber security interview questions and answers in 2023.pdf
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
System and web security
System and web securitySystem and web security
System and web security
 
Top 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdfTop 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdf
 
CNS unit -1.docx
CNS unit -1.docxCNS unit -1.docx
CNS unit -1.docx
 
Seucrity in a nutshell
Seucrity in a nutshellSeucrity in a nutshell
Seucrity in a nutshell
 
UNIT 5 (2).pptx
UNIT 5 (2).pptxUNIT 5 (2).pptx
UNIT 5 (2).pptx
 
VTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesVTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notes
 
Network and Security-2.pptx
Network and Security-2.pptxNetwork and Security-2.pptx
Network and Security-2.pptx
 
Backdoor Entry to a Windows Computer
Backdoor Entry to a Windows ComputerBackdoor Entry to a Windows Computer
Backdoor Entry to a Windows Computer
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
The Maple County court is redesigning its network to ensure more secu.docx
 The Maple County court is redesigning its network to ensure more secu.docx The Maple County court is redesigning its network to ensure more secu.docx
The Maple County court is redesigning its network to ensure more secu.docx
 
Given below is an issue that you have identified as an issue in a ret.pdf
Given below is an issue that you have identified as an issue in a ret.pdfGiven below is an issue that you have identified as an issue in a ret.pdf
Given below is an issue that you have identified as an issue in a ret.pdf
 
2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx
2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx
2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
 
cybersecurity
cybersecuritycybersecurity
cybersecurity
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical Hacking
 

More from Syed Ubaid Ali Jafri

Requirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing LabRequirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing Lab
Syed Ubaid Ali Jafri
 
Review of network diagram
Review of network diagramReview of network diagram
Review of network diagram
Syed Ubaid Ali Jafri
 
Review of network diagram
Review of network diagramReview of network diagram
Review of network diagram
Syed Ubaid Ali Jafri
 
OSI Layered based attacks
OSI Layered based attacksOSI Layered based attacks
OSI Layered based attacks
Syed Ubaid Ali Jafri
 
Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015
Syed Ubaid Ali Jafri
 
Data calling from web to C#
Data calling from web to C#Data calling from web to C#
Data calling from web to C#
Syed Ubaid Ali Jafri
 
Android 2.0 - 4.0 HTML Vulnerable
Android 2.0 - 4.0 HTML Vulnerable Android 2.0 - 4.0 HTML Vulnerable
Android 2.0 - 4.0 HTML Vulnerable
Syed Ubaid Ali Jafri
 
Data Hiding (An Approach towards Stegnography)
Data Hiding (An Approach towards Stegnography) Data Hiding (An Approach towards Stegnography)
Data Hiding (An Approach towards Stegnography)
Syed Ubaid Ali Jafri
 
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali JafriFinal Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri
Syed Ubaid Ali Jafri
 
Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7
Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7
Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7
Syed Ubaid Ali Jafri
 
Syed Ubaid Ali Jafri - Cryptography Techniques
Syed Ubaid Ali Jafri - Cryptography TechniquesSyed Ubaid Ali Jafri - Cryptography Techniques
Syed Ubaid Ali Jafri - Cryptography Techniques
Syed Ubaid Ali Jafri
 
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for AssociatesSyed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri
 
Syed Ubaid Ali Jafri Lecture on Information Technology
Syed Ubaid Ali Jafri Lecture on Information Technology Syed Ubaid Ali Jafri Lecture on Information Technology
Syed Ubaid Ali Jafri Lecture on Information Technology
Syed Ubaid Ali Jafri
 
Storage area network
Storage area networkStorage area network
Storage area network
Syed Ubaid Ali Jafri
 
Securing wireless network
Securing wireless networkSecuring wireless network
Securing wireless network
Syed Ubaid Ali Jafri
 
IP Security over VPN
IP Security over VPNIP Security over VPN
IP Security over VPN
Syed Ubaid Ali Jafri
 
Network security over ethernet
Network security over ethernetNetwork security over ethernet
Network security over ethernet
Syed Ubaid Ali Jafri
 
LAN Security
LAN Security LAN Security
LAN Security
Syed Ubaid Ali Jafri
 

More from Syed Ubaid Ali Jafri (18)

Requirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing LabRequirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing Lab
 
Review of network diagram
Review of network diagramReview of network diagram
Review of network diagram
 
Review of network diagram
Review of network diagramReview of network diagram
Review of network diagram
 
OSI Layered based attacks
OSI Layered based attacksOSI Layered based attacks
OSI Layered based attacks
 
Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015
 
Data calling from web to C#
Data calling from web to C#Data calling from web to C#
Data calling from web to C#
 
Android 2.0 - 4.0 HTML Vulnerable
Android 2.0 - 4.0 HTML Vulnerable Android 2.0 - 4.0 HTML Vulnerable
Android 2.0 - 4.0 HTML Vulnerable
 
Data Hiding (An Approach towards Stegnography)
Data Hiding (An Approach towards Stegnography) Data Hiding (An Approach towards Stegnography)
Data Hiding (An Approach towards Stegnography)
 
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali JafriFinal Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri
 
Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7
Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7
Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7
 
Syed Ubaid Ali Jafri - Cryptography Techniques
Syed Ubaid Ali Jafri - Cryptography TechniquesSyed Ubaid Ali Jafri - Cryptography Techniques
Syed Ubaid Ali Jafri - Cryptography Techniques
 
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for AssociatesSyed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
 
Syed Ubaid Ali Jafri Lecture on Information Technology
Syed Ubaid Ali Jafri Lecture on Information Technology Syed Ubaid Ali Jafri Lecture on Information Technology
Syed Ubaid Ali Jafri Lecture on Information Technology
 
Storage area network
Storage area networkStorage area network
Storage area network
 
Securing wireless network
Securing wireless networkSecuring wireless network
Securing wireless network
 
IP Security over VPN
IP Security over VPNIP Security over VPN
IP Security over VPN
 
Network security over ethernet
Network security over ethernetNetwork security over ethernet
Network security over ethernet
 
LAN Security
LAN Security LAN Security
LAN Security
 

Recently uploaded

按照学校原版(UAL文凭证书)伦敦艺术大学毕业证快速办理
按照学校原版(UAL文凭证书)伦敦艺术大学毕业证快速办理按照学校原版(UAL文凭证书)伦敦艺术大学毕业证快速办理
按照学校原版(UAL文凭证书)伦敦艺术大学毕业证快速办理
yizxn4sx
 
一比一原版(UOL文凭证书)利物浦大学毕业证如何办理
一比一原版(UOL文凭证书)利物浦大学毕业证如何办理一比一原版(UOL文凭证书)利物浦大学毕业证如何办理
一比一原版(UOL文凭证书)利物浦大学毕业证如何办理
eydeofo
 
按照学校原版(UST文凭证书)圣托马斯大学毕业证快速办理
按照学校原版(UST文凭证书)圣托马斯大学毕业证快速办理按照学校原版(UST文凭证书)圣托马斯大学毕业证快速办理
按照学校原版(UST文凭证书)圣托马斯大学毕业证快速办理
zpc0z12
 
1比1复刻澳洲皇家墨尔本理工大学毕业证本科学位原版一模一样
1比1复刻澳洲皇家墨尔本理工大学毕业证本科学位原版一模一样1比1复刻澳洲皇家墨尔本理工大学毕业证本科学位原版一模一样
1比1复刻澳洲皇家墨尔本理工大学毕业证本科学位原版一模一样
2g3om49r
 
SOLIDWORKS 2024 Enhancements eBook.pdf for beginners
SOLIDWORKS 2024 Enhancements eBook.pdf for beginnersSOLIDWORKS 2024 Enhancements eBook.pdf for beginners
SOLIDWORKS 2024 Enhancements eBook.pdf for beginners
SethiLilu
 
一比一原版(KCL文凭证书)伦敦国王学院毕业证如何办理
一比一原版(KCL文凭证书)伦敦国王学院毕业证如何办理一比一原版(KCL文凭证书)伦敦国王学院毕业证如何办理
一比一原版(KCL文凭证书)伦敦国王学院毕业证如何办理
kuehcub
 
按照学校原版(QU文凭证书)皇后大学毕业证快速办理
按照学校原版(QU文凭证书)皇后大学毕业证快速办理按照学校原版(QU文凭证书)皇后大学毕业证快速办理
按照学校原版(QU文凭证书)皇后大学毕业证快速办理
8db3cz8x
 
按照学校原版(Adelaide文凭证书)阿德莱德大学毕业证快速办理
按照学校原版(Adelaide文凭证书)阿德莱德大学毕业证快速办理按照学校原版(Adelaide文凭证书)阿德莱德大学毕业证快速办理
按照学校原版(Adelaide文凭证书)阿德莱德大学毕业证快速办理
terpt4iu
 
按照学校原版(USD文凭证书)圣地亚哥大学毕业证快速办理
按照学校原版(USD文凭证书)圣地亚哥大学毕业证快速办理按照学校原版(USD文凭证书)圣地亚哥大学毕业证快速办理
按照学校原版(USD文凭证书)圣地亚哥大学毕业证快速办理
snfdnzl7
 
按照学校原版(Birmingham文凭证书)伯明翰大学|学院毕业证快速办理
按照学校原版(Birmingham文凭证书)伯明翰大学|学院毕业证快速办理按照学校原版(Birmingham文凭证书)伯明翰大学|学院毕业证快速办理
按照学校原版(Birmingham文凭证书)伯明翰大学|学院毕业证快速办理
6oo02s6l
 
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
xuqdabu
 
加急办理美国南加州大学毕业证文凭毕业证原版一模一样
加急办理美国南加州大学毕业证文凭毕业证原版一模一样加急办理美国南加州大学毕业证文凭毕业证原版一模一样
加急办理美国南加州大学毕业证文凭毕业证原版一模一样
u0g33km
 
一比一原版(ANU文凭证书)澳大利亚国立大学毕业证如何办理
一比一原版(ANU文凭证书)澳大利亚国立大学毕业证如何办理一比一原版(ANU文凭证书)澳大利亚国立大学毕业证如何办理
一比一原版(ANU文凭证书)澳大利亚国立大学毕业证如何办理
nudduv
 
按照学校原版(KCL文凭证书)伦敦国王学院毕业证快速办理
按照学校原版(KCL文凭证书)伦敦国王学院毕业证快速办理按照学校原版(KCL文凭证书)伦敦国王学院毕业证快速办理
按照学校原版(KCL文凭证书)伦敦国王学院毕业证快速办理
terpt4iu
 
按照学校原版(UOL文凭证书)利物浦大学毕业证快速办理
按照学校原版(UOL文凭证书)利物浦大学毕业证快速办理按照学校原版(UOL文凭证书)利物浦大学毕业证快速办理
按照学校原版(UOL文凭证书)利物浦大学毕业证快速办理
terpt4iu
 
Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR
Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalRBuilding a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR
Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR
Peter Gallagher
 
买(usyd毕业证书)澳洲悉尼大学毕业证研究生文凭证书原版一模一样
买(usyd毕业证书)澳洲悉尼大学毕业证研究生文凭证书原版一模一样买(usyd毕业证书)澳洲悉尼大学毕业证研究生文凭证书原版一模一样
买(usyd毕业证书)澳洲悉尼大学毕业证研究生文凭证书原版一模一样
nvoyobt
 
一比一原版(Adelaide文凭证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide文凭证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide文凭证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide文凭证书)阿德莱德大学毕业证如何办理
nudduv
 
按照学校原版(UVic文凭证书)维多利亚大学毕业证快速办理
按照学校原版(UVic文凭证书)维多利亚大学毕业证快速办理按照学校原版(UVic文凭证书)维多利亚大学毕业证快速办理
按照学校原版(UVic文凭证书)维多利亚大学毕业证快速办理
1jtj7yul
 
一比一原版(UQ文凭证书)昆士兰大学毕业证如何办理
一比一原版(UQ文凭证书)昆士兰大学毕业证如何办理一比一原版(UQ文凭证书)昆士兰大学毕业证如何办理
一比一原版(UQ文凭证书)昆士兰大学毕业证如何办理
xuqdabu
 

Recently uploaded (20)

按照学校原版(UAL文凭证书)伦敦艺术大学毕业证快速办理
按照学校原版(UAL文凭证书)伦敦艺术大学毕业证快速办理按照学校原版(UAL文凭证书)伦敦艺术大学毕业证快速办理
按照学校原版(UAL文凭证书)伦敦艺术大学毕业证快速办理
 
一比一原版(UOL文凭证书)利物浦大学毕业证如何办理
一比一原版(UOL文凭证书)利物浦大学毕业证如何办理一比一原版(UOL文凭证书)利物浦大学毕业证如何办理
一比一原版(UOL文凭证书)利物浦大学毕业证如何办理
 
按照学校原版(UST文凭证书)圣托马斯大学毕业证快速办理
按照学校原版(UST文凭证书)圣托马斯大学毕业证快速办理按照学校原版(UST文凭证书)圣托马斯大学毕业证快速办理
按照学校原版(UST文凭证书)圣托马斯大学毕业证快速办理
 
1比1复刻澳洲皇家墨尔本理工大学毕业证本科学位原版一模一样
1比1复刻澳洲皇家墨尔本理工大学毕业证本科学位原版一模一样1比1复刻澳洲皇家墨尔本理工大学毕业证本科学位原版一模一样
1比1复刻澳洲皇家墨尔本理工大学毕业证本科学位原版一模一样
 
SOLIDWORKS 2024 Enhancements eBook.pdf for beginners
SOLIDWORKS 2024 Enhancements eBook.pdf for beginnersSOLIDWORKS 2024 Enhancements eBook.pdf for beginners
SOLIDWORKS 2024 Enhancements eBook.pdf for beginners
 
一比一原版(KCL文凭证书)伦敦国王学院毕业证如何办理
一比一原版(KCL文凭证书)伦敦国王学院毕业证如何办理一比一原版(KCL文凭证书)伦敦国王学院毕业证如何办理
一比一原版(KCL文凭证书)伦敦国王学院毕业证如何办理
 
按照学校原版(QU文凭证书)皇后大学毕业证快速办理
按照学校原版(QU文凭证书)皇后大学毕业证快速办理按照学校原版(QU文凭证书)皇后大学毕业证快速办理
按照学校原版(QU文凭证书)皇后大学毕业证快速办理
 
按照学校原版(Adelaide文凭证书)阿德莱德大学毕业证快速办理
按照学校原版(Adelaide文凭证书)阿德莱德大学毕业证快速办理按照学校原版(Adelaide文凭证书)阿德莱德大学毕业证快速办理
按照学校原版(Adelaide文凭证书)阿德莱德大学毕业证快速办理
 
按照学校原版(USD文凭证书)圣地亚哥大学毕业证快速办理
按照学校原版(USD文凭证书)圣地亚哥大学毕业证快速办理按照学校原版(USD文凭证书)圣地亚哥大学毕业证快速办理
按照学校原版(USD文凭证书)圣地亚哥大学毕业证快速办理
 
按照学校原版(Birmingham文凭证书)伯明翰大学|学院毕业证快速办理
按照学校原版(Birmingham文凭证书)伯明翰大学|学院毕业证快速办理按照学校原版(Birmingham文凭证书)伯明翰大学|学院毕业证快速办理
按照学校原版(Birmingham文凭证书)伯明翰大学|学院毕业证快速办理
 
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
 
加急办理美国南加州大学毕业证文凭毕业证原版一模一样
加急办理美国南加州大学毕业证文凭毕业证原版一模一样加急办理美国南加州大学毕业证文凭毕业证原版一模一样
加急办理美国南加州大学毕业证文凭毕业证原版一模一样
 
一比一原版(ANU文凭证书)澳大利亚国立大学毕业证如何办理
一比一原版(ANU文凭证书)澳大利亚国立大学毕业证如何办理一比一原版(ANU文凭证书)澳大利亚国立大学毕业证如何办理
一比一原版(ANU文凭证书)澳大利亚国立大学毕业证如何办理
 
按照学校原版(KCL文凭证书)伦敦国王学院毕业证快速办理
按照学校原版(KCL文凭证书)伦敦国王学院毕业证快速办理按照学校原版(KCL文凭证书)伦敦国王学院毕业证快速办理
按照学校原版(KCL文凭证书)伦敦国王学院毕业证快速办理
 
按照学校原版(UOL文凭证书)利物浦大学毕业证快速办理
按照学校原版(UOL文凭证书)利物浦大学毕业证快速办理按照学校原版(UOL文凭证书)利物浦大学毕业证快速办理
按照学校原版(UOL文凭证书)利物浦大学毕业证快速办理
 
Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR
Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalRBuilding a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR
Building a Raspberry Pi Robot with Dot NET 8, Blazor and SignalR
 
买(usyd毕业证书)澳洲悉尼大学毕业证研究生文凭证书原版一模一样
买(usyd毕业证书)澳洲悉尼大学毕业证研究生文凭证书原版一模一样买(usyd毕业证书)澳洲悉尼大学毕业证研究生文凭证书原版一模一样
买(usyd毕业证书)澳洲悉尼大学毕业证研究生文凭证书原版一模一样
 
一比一原版(Adelaide文凭证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide文凭证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide文凭证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide文凭证书)阿德莱德大学毕业证如何办理
 
按照学校原版(UVic文凭证书)维多利亚大学毕业证快速办理
按照学校原版(UVic文凭证书)维多利亚大学毕业证快速办理按照学校原版(UVic文凭证书)维多利亚大学毕业证快速办理
按照学校原版(UVic文凭证书)维多利亚大学毕业证快速办理
 
一比一原版(UQ文凭证书)昆士兰大学毕业证如何办理
一比一原版(UQ文凭证书)昆士兰大学毕业证如何办理一比一原版(UQ文凭证书)昆士兰大学毕业证如何办理
一比一原版(UQ文凭证书)昆士兰大学毕业证如何办理
 

Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hackers

  • 1. 1 TECHNICAL GUIDELINES ON How to Secure a POS System from Hackers By: Syed Ubaid Ali Jafri Information Security Professional LinkedIn: https://pk.linkedin.com/in/ubaidjafri
  • 2. 2 Contents Background..............................................................................................................................................................................................................3 Objective..................................................................................................................................................................................................................3 Testing Type .............................................................................................................................................................................................................3 TOP 15 Controls Checklist..........................................................................................................................................................................................4 POS Checklist............................................................................................................................................................................................................7 References................................................................................................................................................................................................................8
  • 3. 3 Background The payment terminals we are talking about are tamper proof. They usually have Ethernet connectivity, and a serial line. The interface open to normal user is the card slot and PIN pad, and in some occasions contactless reader. The actual configuration does vary between models and vendors, but the basic idea is that the terminal initiates all the connections and doesn't listen to anything incoming. Objective Our objective for publishing this document is to ensure technically that the initial security up to a level where POS should be secure from basic attacks. Testing Type This testing involves the Physical layer to Presentation Layer testing which includes the following controls but not limited to S.No Control Name 1 Insecure Physical Connectivity 2 IP/MAC Address Spoofing 3 Weak or Default credentials on Device 4 Insecure Communication Protocol 5 Unencrypted Data Travelling 6 Insecure Data Storage 7 Sensitive Information Disclosure 8 Shared File Enumeration 9 Stress testing of PoS Machine 10 Inadequate Transaction Handling 11 Un-necessary services/Ports open 12 Absence of Audit Logging 13 Missing Patches 14 SNMP public community string 15 SSL/TLS Configuration Weaknesses
  • 4. 4 TOP 15 Controls Checklist Summary Sheet of Controls S. No Control Name Control Description Severity Impact 1 Physical Connectivity of PoS The Network connectivity of of PoS device whether the device is connected with Wireless Router or with LAN Switch. Ensure that no other user is able to connect to the same Wifi or LAN Network High An attacker or malicious user with local network access is able to plug their infected machine with the network connected to a PoS system, An attacker would be able to sniff or capture the data on the network. An attacker can easily perform a MiTM attack against this connectivity, 2 IP/MAC Address Spoofing A network attacker can use a protocol analyzer to know a valid MAC address, By examining the MAC Address, An Attacker is able to spoofed the IP/MAC Address of the POS Machine High An attacker can easily steal the identity of the device, an attacker can perform the malicious activity by showing the legitimate device identity which doesn’t belong to them. 3 Weak or Default credentials on Device Device is using the default username or password for hardware administration High An attacker or malicious user is able to perform modification by using the default credentials on device, an attacker is able to change or modify the hardware configurations on device. 4 Insecure Communication Protocol Device is using the weak protocols (FTP, Telnet, VNC, RDP) for remote administration which could lead towards confidentiality, intigrity , availability attack High An attacker or malicious user, with local network access, is able to perform a Man- in-the-Middle attack (MITM) and can see all communication between the POS and the FTP server on the. Using a username and password obtained by passively sniffing traffic on the network, the attacker can connect to the FTP server, download, modify, and then upload arbitrary files 5 Unencrypted Data Travelling Device is able to send data unencrypted on Wifi/LAN channel High An Attacker or malicious user, with local network access, is able to perform a sniffing attack on Wi-Fi/LAN Network. Capturing the unencrypted traffic contains the sensitive information of (Usernames, Password, accounts information)
  • 5. 5 6 Insecure Data Storage Device is able to store the data on Memory card or in the device itself High An attacker is able to copy all the stored data on the machine or in the memory card, which could help an attacker to generate the fake card of original values stored in the device or memory card, by using different strip card reader writer machines. 7 Sensitive Information Disclosure Device is capable to exposing the sensitive data which contains (Track 1 record, Track 2 record and CVV Number of customer High An attacker is able to read or sniff the Track-1, Track-2 Data of customer which could impact towards fake card generation or online sale purchasing of goods. 8 Shared File Enumeration Device has multiple open folders that are shared and has access to the root directory directly High This may directly lead to system compromise by allowing modification of system files. 9 Stress Testing of Pos Terminal The device is not capable for handling huge load on the network, the devices is able to randomly shut down and restart ports on the network switches/routers that connect the servers (via SNMP commands for example), double the baseline number for concurrent users/HTTP connections High An attacker using less skills can perform the attacker on the system which could lead towards availability attack. 10 Inadequate Transaction Handling An attacker is able to retrieve the configuration information from the Server, the authentication takes place in plaintext over the local network, and all the transactions are shown in plaintext in the text file. High An attacker can perform the Man-in-the- Middle attack and can change the price value, modify the items and their date. 11 Un-necessary services/Ports open There are multiple ports that are open and not being used on the device Medium By using unused port an attacker can perform a brute force attack or sending the SYN request to the terminal machine which could lead towards availability attack.
  • 6. 6 12 Absence of Audit Logging Device is not able to record the logs of (Logged in, Transactions, Network Connectivity) Medium Due to absence of Audit Logging, An attacker can easily perform malicious activities and hide their tracks. 13 Missing Patches Critical Microsoft security patches were not installed on the PoS Sytem. The missing patches address vulnerabilities which may allow unauthenticated remote code execution, privilege escalation, denial of service, and confidential information disclosure Medium An attacker or malicious user with network access may be able to view sensitive information, cause Denial-of- Service, or execute arbitrary code. An attacker with local access to the hosts may be able to escalate their privileges up to the administrator level. 14 SNMP public community string Simple Network Management Protocol (SNMP) community string ‘public’ is used on the PoS Machine, granting READ-ONLY access to information on remote hosts. SNMP is generally used for system and network monitoring purposes. Typically, a remote network management server queries a remote SNMP agent (residing on the target system) for system status, by supplying a community string for authentication. Medium An attacker or malicious user is able to use the default SNMP community string to discover detailed device metadata and network configuration details, which can assist in other attacks. The information disclosed includes the operating system version, a list of users on the system, a list of installed software, any enabled network interfaces, routing information, as well as any open TCP connections. 15 SSL/TLS Configuration Weaknesses Secure Sockets Layer (SSL) and Transport Layer Security (TLS) are used in the POS environment to protect the confidentiality and integrity of connections to database servers, and to the administrative web interface of the site router. We identified the following misconfigurations with the implementation of SSL/TLS. Medium An attacker or malicious user with network access is able to impersonate SSL/TLS-protected services, or carry out Man-in-The-Middle attacks, compromising the confidentiality and integrity of encrypted network communications. These communications may include sensitive business information such as transactions and payment data, as well as technical information such as credentials or configuration files
  • 7. 7 POS Checklist A pointof sales(POS) systems needsassessmentisessential forplanningthe selectionand deploymentof pointof salessystem. Thischecklistwillassist indefiningsystemrequirementsandwill also provide the foundationforVulnerabilitywhichcouldbe foundinthe control,the riskassociatedwiththe vulnerability,itsimpactanalysis,anditstechnical recommendationswhichincludes(Configurational changes,Proceduralchanges,Software/Services changesetc.) PoS (Point of Sale ) Information Security Checklist S. No Control Name Control Presence Risk Description Impact Severity Recommendation 1  2  3  4 5 
  • 8. 8 References 1 http://www.internetsociety.org/doc/addressing-challenge-ip-spoofing 2 http://www.guru99.com/testing-for-retail-pos-point-of-sale-system.html 3 https://community.hpe.com/t5/Security-Research/Hacking-POS-Terminal-for-Fun-and-Non-profit/ba-p/6540620#.WEfkGNV97IU 4 http://www.pcworld.com/article/259882/vulnerabilities_in_payment_terminals_demonstrated_at_black_hat.html 5 https://pen-testing.sans.org/blog/2014/06/12/pen-testing-payment-terminals-a-step-by-step-how-to-guide 6 http://www.slideshare.net/evilhackerz/penetration-testing-guidancemarch2015