Главная
Study mode:
on
1
Introduction
2
POS Data Breaches
3
Credit Cards
4
POS Components
5
POS Software
6
Magnetic Stripe: Track 1
7
Major Transition Types
8
Data Encryption
9
Attack Scenario
10
RAM Scraper Attack Working
11
Verify Card Number
12
Mitigation
Description:
Explore the inner workings of memory scraping, credit card stealing point-of-sale (POS) malware in this 56-minute conference talk from AppSecUSA 2014. Dive into RAM scraping techniques used to steal credit card data from POS systems, evading disk and transit encryption. Witness a live demonstration of custom-built malware to understand its behavior under various conditions. Learn effective strategies to hinder malware operations, including memory size alterations, POS process concealment, and malware detection techniques. Gain valuable insights into POS data breaches, credit card components, magnetic stripe data, encryption methods, and mitigation strategies to protect against these sophisticated attacks.

Anatomy of Memory Scraping Credit Card Stealing POS Malware

OWASP Foundation
Add to list
0:00 / 0:00