Главная
Study mode:
on
1
Introduction
2
Presentation
3
History
4
Previous work
5
Structure of payment processing
6
How did we choose POS system
7
Processing
8
Demo
9
Demonstration
10
Communication between cashier workstation and POS server
11
Demonstration of the possibilities
12
Store Manager Connection
13
Whats Next
14
Scheme Of Attack
15
Remote Code Execution
16
Full Control
17
Full Demo
18
Encryption
19
Extra Server
20
Extra Server Patch
21
Micros
Description:
Explore the world of Point of Sale (POS) and Point of Purchase (POP) system vulnerabilities in this eye-opening conference talk from HITB GSEC 2017. Delve into the methods attackers use to access these critical retail systems, with a focus on SAP POS. Witness a fully operational attack vector demonstration, from initial breach to accessing sensitive data. Learn about the structure of payment processing, communication between cashier workstations and POS servers, and potential vulnerabilities in store manager connections. Discover remote code execution techniques and ways to gain full control of these systems. Examine encryption methods, extra server vulnerabilities, and patches. Gain practical insights into POS security beyond common knowledge, and understand why the retail sector faces the most security incidents related to credit card theft. Be prepared for a new perspective on credit card transactions after this revealing presentation.

Get to the Money - Hacking PoS and PoP Systems

Hack In The Box Security Conference
Add to list
0:00 / 0:00