青青草原综合久久大伊人导航_色综合久久天天综合_日日噜噜夜夜狠狠久久丁香五月_热久久这里只有精品

Michael's Space

Technology changes the world, serves the people.
  C++博客 :: 首頁 :: 新隨筆 :: 聯系 :: 聚合  :: 管理
Source: http://www.wired.com/threatlevel/2010/07/atms-jackpotted/

Researcher Demonstrates ATM ‘Jackpotting’ at Black Hat Conference

LAS VEGAS — In a city filled with slot machines spilling jackpots, it was a “jackpotted” ATM that got the most attention Wednesday at the Black Hat security conference, when researcher Barnaby Jack demonstrated two suave hacks against automated teller machines that made them spew out dozens of crisp bills.

The audience greeted the demonstration with hoots and applause.

In one of the attacks, Jack reprogrammed the ATM remotely over a network, without touching the machine; the second attack required he open the front panel and plug in a USB stick loaded with malware.

Jack, director of security research at IOActive Labs, focused his hack research on standalone and hole-in-the-wall ATMs — the kind installed in retail outlets and restaurants. He did not rule out that bank ATMs could have similar vulnerabilities, but he hasn’t yet examined them.

The two systems he hacked onstage were made by Triton and Tranax. The Tranax hack was conducted using an authentication bypass vulnerability that Jack found in the system’s remote monitoring feature, which can be accessed over the internet or dial-up, depending on how the owner configured the machine.

Tranax’s remote monitoring system is turned on by default, but Jack said the company has since begun advising customers to protect themselves from the attack by disabling the remote system.

To conduct the remote hack, an attacker would need to know an ATM’s IP address or phone number. Jack said he believes about 95 percent of retail ATMs are on dial-up; a hacker could war dial for ATMs connected to telephone modems, and identify them by the cash machine’s proprietary protocol.

The Triton attack was made possible by a security flaw that allowed unauthorized programs to execute on the system. The company distributed a patch last November so that only digitally signed code can run on them.

Both the Triton and Tranax ATMs run on Windows CE.

Using a remote attack tool, dubbed Dillinger, Jack was able to exploit the authentication-bypass vulnerability in Tranax’s remote monitoring feature and upload software or overwrite the entire firmware on the system. With that capability, he installed a malicious program he wrote, called Scrooge.

Scrooge lurks on the ATM quietly in the background until someone wakes it up in person. It can be initiated in two ways — either through a touch-sequence entered on the ATM’s keypad or by inserting a special control card. Both methods activate a hidden menu an attacker can use to make the machine spew out money or print receipts. Scrooge will also capture magstripe data embedded in bank cards other users insert into the ATM.

To demonstrate, Jack punched keys on the keypad to call up the menu, then instructed the machine to spit out 50 bills from one of four cassettes. The screen lit up with the word “Jackpot!” as the bills came flying out the front.

To hack the Triton, he used a key to open the machine’s front panel, then connected a USB stick containing his malware. The ATM uses a uniform lock on all of its systems — the kind used on filing cabinets — that can be opened with a $10 key available on the web. The same key opens every Triton ATM.

Two Triton representatives said at a press conference after the presentation that its customers preferred a single lock on systems so they could easily manage fleets of machines without requiring numerous keys. But they said Triton offers a lock upgrade kit to customers who request it — the upgraded lock is a Medeco pick-resistant, high-security lock.

Similar malware attacks were discovered on bank ATMs in Eastern Europe last year. Security researchers at Trustwave, based in Chicago, found the malware on 20 machines in Russia and Ukraine that were all running Microsoft’s Windows XP operating system. They said they found signs that hackers were planning on bringing their attacks to machines in the United States. The malware was designed to attack ATMs made by Diebold and NCR.

Those attacks required an insider, such as an ATM technician or anyone else with a key to the machine, to place malware on the ATM. Once that was done, attackers could insert a control card into the machine’s card reader to trigger the malware and give them control of the machine through a custom interface and the ATM’s keypad.

The malware captured account numbers and PINs from the machine’s transaction application and then delivered it to the thief on a receipt printed from the machine in an encrypted format, or to a storage device inserted in the card reader. A thief could also instruct the machine to eject whatever cash was inside the machine. A fully loaded bank ATM can hold up to $600,000.

Earlier this year, in a separate incident, a Bank of America employee was charged with installing malware on his employer’s ATMs that allowed him to withdraw thousands of dollars without leaving a transaction record.

Jack was slated to give the same ATM vulnerability talk at Black Hat last year, but his then-employer Juniper Networks canceled the talk weeks before the conference after an unnamed ATM vendor expressed concern. He said on Wednesday that the earlier talk was withdrawn to allow Triton time to implement a patch to address the code-execution vulnerability targeted in his demonstration. The company released the patch eight months ago.

Jack said that so far he’s examined ATMs made by four manufacturers and all of them have vulnerabilities. “Every ATM I’ve looked at allows that ‘game over.’ I’m four for four,” he said at the press conference. He wouldn’t discuss the vulnerabilities in the two ATMs not attacked on Wednesday because he said his previous employer, Juniper Networks, owns that research.

Jack said his aim in demonstrating the hacks is to get people to look more closely at the security of systems that are presumed to be locked down and impenetrable.

Photo: Isaac Brekken/Associated Press



Read More http://www.wired.com/threatlevel/2010/07/atms-jackpotted/#ixzz0vAgMMN79

青青草原综合久久大伊人导航_色综合久久天天综合_日日噜噜夜夜狠狠久久丁香五月_热久久这里只有精品
  • <ins id="pjuwb"></ins>
    <blockquote id="pjuwb"><pre id="pjuwb"></pre></blockquote>
    <noscript id="pjuwb"></noscript>
          <sup id="pjuwb"><pre id="pjuwb"></pre></sup>
            <dd id="pjuwb"></dd>
            <abbr id="pjuwb"></abbr>
            欧美三级资源在线| 亚洲欧美日韩国产另类专区| av成人免费| 亚洲国产精品一区二区久| 韩国三级电影久久久久久| 国产一区二区三区的电影| 国产一区二区三区成人欧美日韩在线观看 | 亚洲精品欧美日韩| 日韩一级精品| 亚洲一区免费看| 欧美中文在线观看| 欧美sm视频| 国产精品亚洲片夜色在线| 国产在线精品一区二区中文| 亚洲国产精品高清久久久| 99视频精品全部免费在线| 欧美一级大片在线免费观看| 蜜桃av一区| 一区二区三区免费看| 久久福利影视| 亚洲视频在线一区| 欧美亚洲第一区| 国产一区欧美| 一区二区三区国产在线观看| 久久国产精品一区二区三区四区 | 国产欧美日韩三级| 亚洲精品你懂的| 久久国产精品网站| 日韩视频精品在线观看| 久久精品视频网| 欧美调教视频| 亚洲国产美女| 久久久福利视频| 亚洲欧洲一区| 欧美一区免费视频| 欧美涩涩网站| 91久久精品一区| 久久精品国产99国产精品澳门| 亚洲激情不卡| 久久影院午夜论| 国内精品久久久久国产盗摄免费观看完整版| 亚洲乱码一区二区| 久久综合一区| 欧美一级播放| 国产欧美一区二区精品秋霞影院| 日韩亚洲综合在线| 欧美黄色aa电影| 久久激情视频久久| 国产视频在线观看一区二区| 宅男精品视频| 亚洲三级国产| 欧美国产一区二区| 亚洲欧洲精品天堂一级| 久久久亚洲欧洲日产国码αv | 男男成人高潮片免费网站| 亚洲女同在线| 国产美女精品人人做人人爽| 亚洲影院在线| 亚洲视频一二| 国产精品家教| 亚洲影院在线| 亚洲淫性视频| 国产日韩在线不卡| 久久国产一区| 久久成人在线| 亚洲福利视频网站| 欧美高清在线精品一区| 欧美freesex交免费视频| 91久久在线观看| 亚洲人体影院| 国产精品成人免费| 性色av一区二区怡红| 午夜免费电影一区在线观看| 国产欧美日韩综合一区在线播放 | 欧美激情亚洲视频| 免费久久99精品国产自在现线| 亚洲精品久久视频| 欧美日韩亚洲不卡| 午夜免费日韩视频| 久久久久久久综合色一本| 亚洲国产高清aⅴ视频| 亚洲国产精品一区| 欧美午夜不卡视频| 久久精品国产一区二区电影| 久久国内精品自在自线400部| 在线欧美小视频| 91久久精品国产91性色tv| 欧美日韩成人在线| 亚洲欧美日韩视频一区| 欧美亚洲专区| 亚洲三级影片| 亚洲欧美日韩国产| 亚洲第一中文字幕| 中文av字幕一区| 黄色亚洲免费| 日韩五码在线| 一区二区三区在线视频播放| 99re6这里只有精品视频在线观看| 国产精品视频久久久| 欧美成人激情视频| 国产精品国产a| 欧美国产日本| 国产日韩欧美a| 91久久香蕉国产日韩欧美9色| 国产精品久久久久久久久免费樱桃| 久热精品视频在线免费观看 | 韩国精品久久久999| 亚洲人成毛片在线播放| 激情成人av在线| 中国女人久久久| 日韩午夜一区| 久久最新视频| 久久精品三级| 国产老女人精品毛片久久| 亚洲欧洲一区二区天堂久久| 伊人久久大香线蕉av超碰演员| 制服丝袜激情欧洲亚洲| 亚洲日本在线视频观看| 欧美一区二区三区视频| 亚洲欧美欧美一区二区三区| 欧美日本不卡视频| 欧美黄色精品| 亚洲电影在线播放| 久久九九久精品国产免费直播| 亚洲视频免费在线| 欧美jizzhd精品欧美喷水 | 亚洲欧美激情精品一区二区| 亚洲毛片在线| 欧美大片一区| 亚洲国产三级在线| 亚洲激情校园春色| 女仆av观看一区| 欧美成人免费全部| 亚洲第一精品福利| 蜜桃av一区二区三区| 欧美chengren| 亚洲精品国产无天堂网2021| 美女999久久久精品视频| 一区二区三区免费看| 亚洲一区二区欧美| 亚洲天堂黄色| 欧美性大战久久久久| 一区二区日韩精品| 亚洲综合色自拍一区| 国产精品每日更新在线播放网址| 日韩午夜三级在线| 亚洲一区二区av电影| 国产精品久久77777| 一本一本a久久| 性欧美18~19sex高清播放| 国产精品五月天| 欧美一二区视频| 你懂的国产精品永久在线| 亚洲国产二区| 欧美视频一区二区| 欧美一区二视频| 欧美成人精品激情在线观看| 91久久香蕉国产日韩欧美9色| 欧美日韩91| 新狼窝色av性久久久久久| 美国十次了思思久久精品导航| 亚洲激情六月丁香| 欧美性色视频在线| 欧美中文日韩| 亚洲精品字幕| 久久精品最新地址| 亚洲美女淫视频| 国产亚洲毛片在线| 欧美jizzhd精品欧美巨大免费| 在线亚洲国产精品网站| 久久久久国产精品午夜一区| 亚洲精品视频在线观看免费| 国产精品第三页| 麻豆成人在线| 亚洲女与黑人做爰| 亚洲精美视频| 久久久噜噜噜久久中文字免| 亚洲毛片网站| 狠狠色狠狠色综合日日tαg| 欧美日本高清视频| 久久久久久久91| 亚洲午夜伦理| 亚洲韩国精品一区| 老司机精品福利视频| 亚洲与欧洲av电影| 亚洲精品在线一区二区| 激情久久五月天| 国产精品伊人日日| 欧美三级电影大全| 免费久久99精品国产自在现线| 午夜精品久久久99热福利| 91久久夜色精品国产网站| 美日韩免费视频| 久久久久九九视频| 欧美在线观看网站| 亚洲欧美日韩网| 在线一区亚洲| aa亚洲婷婷| 日韩一级黄色大片| 亚洲精品乱码久久久久久黑人|