Главная
Study mode:
on
1
Intro
2
Point of Sale terminals
3
Bar in 44CON
4
Mobile pointofsale terminals
5
Previous research
6
Project overview
7
Security assessment
8
How payments work
9
Payment aggregators
10
Payment methods
11
EMV adoption
12
Schematic overview
13
Findings
14
Bluetooth
15
Bluetooth Protocol
16
Bluetooth Classic
17
Bluetooth Device Address
18
Bluetooth Attack Vectors
19
Maninthemiddle attacks
20
Enhanced data rates
21
Sending arbitrary commands
22
Prerequisites
23
Wireshark
24
In practice
25
In detail
26
What is fuzzing
27
The ESP32
28
Output
29
Sending
30
External Devices
31
Demo
32
Mac Stripe
33
Recommendations
34
Mobile POS
35
Reverse Engineering
36
Updating Process
37
Open Account
38
Un unencrypted firmware
39
Remote code execution
40
Why its important to have full access
41
Two potential problems
42
Scenario
43
Hardware Protection
44
Secondary Factors
45
Assessing risk
46
Conclusions
47
Vendors
48
Merchants
Description:
Explore vulnerabilities in mobile point of sales systems through a comprehensive conference talk delivered at 44CON 2018. Dive into the security implications of lowering economic barriers for accepting card payments and the risks associated with relying on older card standards like mag-stripe. Witness live demonstrations of new vulnerabilities affecting major mPOS providers, including Square, SumUp, iZettle, and PayPal. Learn about man-in-the-middle attacks, sending arbitrary code via Bluetooth and mobile applications, modifying payment values for mag-stripe transactions, and firmware vulnerabilities leading to denial of service and remote code execution. Discover how to conduct attacks using simple, low-cost hardware and automate the process of sending pre-generated messages to mPOS devices during transactions. Gain insights into integrating testing practices into organizations and research, identifying weaknesses in payment technologies, and evading detection despite anti-fraud and security mechanisms. Read more

For the Love of Money - Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems

44CON Information Security Conference
Add to list
0:00 / 0:00