青青草原综合久久大伊人导航_色综合久久天天综合_日日噜噜夜夜狠狠久久丁香五月_热久久这里只有精品

Michael's Space

Technology changes the world, serves the people.
  C++博客 :: 首頁 :: 新隨筆 :: 聯系 :: 聚合  :: 管理
Source: http://www.wired.com/threatlevel/2010/07/atms-jackpotted/

Researcher Demonstrates ATM ‘Jackpotting’ at Black Hat Conference

LAS VEGAS — In a city filled with slot machines spilling jackpots, it was a “jackpotted” ATM that got the most attention Wednesday at the Black Hat security conference, when researcher Barnaby Jack demonstrated two suave hacks against automated teller machines that made them spew out dozens of crisp bills.

The audience greeted the demonstration with hoots and applause.

In one of the attacks, Jack reprogrammed the ATM remotely over a network, without touching the machine; the second attack required he open the front panel and plug in a USB stick loaded with malware.

Jack, director of security research at IOActive Labs, focused his hack research on standalone and hole-in-the-wall ATMs — the kind installed in retail outlets and restaurants. He did not rule out that bank ATMs could have similar vulnerabilities, but he hasn’t yet examined them.

The two systems he hacked onstage were made by Triton and Tranax. The Tranax hack was conducted using an authentication bypass vulnerability that Jack found in the system’s remote monitoring feature, which can be accessed over the internet or dial-up, depending on how the owner configured the machine.

Tranax’s remote monitoring system is turned on by default, but Jack said the company has since begun advising customers to protect themselves from the attack by disabling the remote system.

To conduct the remote hack, an attacker would need to know an ATM’s IP address or phone number. Jack said he believes about 95 percent of retail ATMs are on dial-up; a hacker could war dial for ATMs connected to telephone modems, and identify them by the cash machine’s proprietary protocol.

The Triton attack was made possible by a security flaw that allowed unauthorized programs to execute on the system. The company distributed a patch last November so that only digitally signed code can run on them.

Both the Triton and Tranax ATMs run on Windows CE.

Using a remote attack tool, dubbed Dillinger, Jack was able to exploit the authentication-bypass vulnerability in Tranax’s remote monitoring feature and upload software or overwrite the entire firmware on the system. With that capability, he installed a malicious program he wrote, called Scrooge.

Scrooge lurks on the ATM quietly in the background until someone wakes it up in person. It can be initiated in two ways — either through a touch-sequence entered on the ATM’s keypad or by inserting a special control card. Both methods activate a hidden menu an attacker can use to make the machine spew out money or print receipts. Scrooge will also capture magstripe data embedded in bank cards other users insert into the ATM.

To demonstrate, Jack punched keys on the keypad to call up the menu, then instructed the machine to spit out 50 bills from one of four cassettes. The screen lit up with the word “Jackpot!” as the bills came flying out the front.

To hack the Triton, he used a key to open the machine’s front panel, then connected a USB stick containing his malware. The ATM uses a uniform lock on all of its systems — the kind used on filing cabinets — that can be opened with a $10 key available on the web. The same key opens every Triton ATM.

Two Triton representatives said at a press conference after the presentation that its customers preferred a single lock on systems so they could easily manage fleets of machines without requiring numerous keys. But they said Triton offers a lock upgrade kit to customers who request it — the upgraded lock is a Medeco pick-resistant, high-security lock.

Similar malware attacks were discovered on bank ATMs in Eastern Europe last year. Security researchers at Trustwave, based in Chicago, found the malware on 20 machines in Russia and Ukraine that were all running Microsoft’s Windows XP operating system. They said they found signs that hackers were planning on bringing their attacks to machines in the United States. The malware was designed to attack ATMs made by Diebold and NCR.

Those attacks required an insider, such as an ATM technician or anyone else with a key to the machine, to place malware on the ATM. Once that was done, attackers could insert a control card into the machine’s card reader to trigger the malware and give them control of the machine through a custom interface and the ATM’s keypad.

The malware captured account numbers and PINs from the machine’s transaction application and then delivered it to the thief on a receipt printed from the machine in an encrypted format, or to a storage device inserted in the card reader. A thief could also instruct the machine to eject whatever cash was inside the machine. A fully loaded bank ATM can hold up to $600,000.

Earlier this year, in a separate incident, a Bank of America employee was charged with installing malware on his employer’s ATMs that allowed him to withdraw thousands of dollars without leaving a transaction record.

Jack was slated to give the same ATM vulnerability talk at Black Hat last year, but his then-employer Juniper Networks canceled the talk weeks before the conference after an unnamed ATM vendor expressed concern. He said on Wednesday that the earlier talk was withdrawn to allow Triton time to implement a patch to address the code-execution vulnerability targeted in his demonstration. The company released the patch eight months ago.

Jack said that so far he’s examined ATMs made by four manufacturers and all of them have vulnerabilities. “Every ATM I’ve looked at allows that ‘game over.’ I’m four for four,” he said at the press conference. He wouldn’t discuss the vulnerabilities in the two ATMs not attacked on Wednesday because he said his previous employer, Juniper Networks, owns that research.

Jack said his aim in demonstrating the hacks is to get people to look more closely at the security of systems that are presumed to be locked down and impenetrable.

Photo: Isaac Brekken/Associated Press



Read More http://www.wired.com/threatlevel/2010/07/atms-jackpotted/#ixzz0vAgMMN79

青青草原综合久久大伊人导航_色综合久久天天综合_日日噜噜夜夜狠狠久久丁香五月_热久久这里只有精品
  • <ins id="pjuwb"></ins>
    <blockquote id="pjuwb"><pre id="pjuwb"></pre></blockquote>
    <noscript id="pjuwb"></noscript>
          <sup id="pjuwb"><pre id="pjuwb"></pre></sup>
            <dd id="pjuwb"></dd>
            <abbr id="pjuwb"></abbr>
            欧美主播一区二区三区| 欧美在线国产精品| 欧美成人一区二区三区在线观看| 红桃视频欧美| 蜜桃伊人久久| 六月丁香综合| 亚洲精品久久久久久一区二区| 欧美激情精品久久久久久| 久久永久免费| 亚洲精品视频在线观看网站| 亚洲国产精品日韩| 欧美黄色大片网站| 日韩一级成人av| 一本久道久久综合中文字幕| 国产精品午夜视频| 欧美在线亚洲在线| 久久久女女女女999久久| 亚洲日本久久| 国产精品99久久久久久久vr| 国产乱人伦精品一区二区| 久久精品人人做人人爽电影蜜月| 久久亚洲私人国产精品va| 亚洲日韩视频| 国产精品99久久久久久白浆小说| 国产一区二区三区日韩| 欧美电影资源| 国产精品毛片大码女人| 久久免费高清视频| 欧美激情片在线观看| 午夜精品久久久久久久久久久| 亚洲免费人成在线视频观看| 在线欧美日韩国产| 一区二区激情视频| 国产婷婷成人久久av免费高清| 狂野欧美激情性xxxx| 欧美日韩久久精品| 欧美一区2区三区4区公司二百| 久久免费视频在线观看| 亚洲伊人网站| 老司机一区二区三区| 欧美一区二区三区免费在线看| 毛片一区二区| 欧美一区二区三区视频免费| 欧美福利电影在线观看| 久久免费一区| 国产精品专区第二| 亚洲精品自在久久| 精品动漫一区二区| 亚洲综合不卡| 亚洲一区二区黄| 欧美第一黄色网| 久久视频一区二区| 国产精品日产欧美久久久久| 亚洲经典在线看| 亚洲国产精品久久| 久久国产天堂福利天堂| 欧美一级淫片aaaaaaa视频| 欧美激情第10页| 欧美福利一区二区三区| 国产综合色在线视频区| 午夜国产精品视频免费体验区| 一区二区三区av| 欧美肥婆在线| 亚洲国产黄色片| 亚洲国产黄色| 免播放器亚洲| 欧美福利网址| 亚洲区欧美区| 女人色偷偷aa久久天堂| 欧美国产日韩精品| 亚洲电影免费观看高清完整版在线观看| 性欧美video另类hd性玩具| 午夜国产精品影院在线观看| 国产精品v欧美精品v日韩| 亚洲精品一品区二品区三品区| 亚洲另类自拍| 欧美精品日韩一区| 亚洲三级观看| 亚洲一区二区三区视频| 国产精品美女久久久久久免费| 99在线观看免费视频精品观看| 亚洲天堂av在线免费观看| 欧美精品自拍偷拍动漫精品| 亚洲靠逼com| 亚洲一区在线免费| 国产精品一区二区三区久久| 午夜久久资源| 牛牛影视久久网| 亚洲精品国产欧美| 欧美日韩亚洲系列| 亚洲一区一卡| 久久一区精品| 亚洲精品一线二线三线无人区| 欧美精品aa| 亚洲一区二区在线免费观看| 久久久xxx| 亚洲伦理自拍| 国产欧美日韩视频一区二区| 久久久久网站| 亚洲美女区一区| 久久久久久网址| 亚洲日本一区二区| 国产精品亚洲аv天堂网| 久久成人羞羞网站| 亚洲精品你懂的| 亚洲网站在线| 在线观看91久久久久久| 欧美欧美午夜aⅴ在线观看| 亚洲性图久久| 亚洲高清久久| 欧美一区二区三区四区高清| 亚洲国产成人不卡| 国产精品狼人久久影院观看方式| 久久国产精品72免费观看| 亚洲人屁股眼子交8| 久久国产黑丝| 亚洲视频一二| 亚洲黄色天堂| 国产一区二区视频在线观看| 欧美人牲a欧美精品| 久久久久久亚洲综合影院红桃| 夜夜嗨av一区二区三区中文字幕 | 久久久久国色av免费看影院| 亚洲精品视频一区| 久久中文字幕一区| 午夜精品一区二区三区在线视 | 在线观看三级视频欧美| 欧美三级午夜理伦三级中视频| 久久激情中文| 午夜综合激情| 中日韩高清电影网| 亚洲精品久久久久久久久久久久| 久久免费观看视频| 欧美一区二区三区四区高清| 一本色道久久88综合日韩精品| 极品尤物久久久av免费看| 国产精品网站一区| 欧美色一级片| 欧美区亚洲区| 欧美粗暴jizz性欧美20| 久久久久成人网| 欧美一区二区三区免费看| 一区二区三区久久网| 亚洲精品国产精品国自产观看浪潮 | 欧美精品一区二区三| 久热精品视频在线观看| 欧美在线www| 欧美伊久线香蕉线新在线| 性欧美暴力猛交另类hd| 亚洲午夜精品久久久久久浪潮 | 亚洲国产91| 亚洲福利在线观看| 亚洲国产精品黑人久久久| 裸体歌舞表演一区二区| 久久久在线视频| 久久综合狠狠| 欧美韩日一区| 亚洲激情视频| 亚洲美女毛片| 亚洲一区二区三区免费在线观看| 亚洲久色影视| 亚洲在线播放电影| 欧美一区二区在线看| 久久久久久久国产| 蜜臀va亚洲va欧美va天堂| 欧美日韩xxxxx| 国产精品成人一区二区三区夜夜夜| 欧美日韩中文字幕| 国产精品一二三视频| 激情伊人五月天久久综合| 亚洲国产精品va| 中国亚洲黄色| 久久久免费av| 亚洲国内高清视频| 亚洲尤物视频网| 久久综合影音| 国产精品毛片a∨一区二区三区|国| 国产视频精品网| 亚洲精品人人| 亚洲欧美日韩精品久久久| 另类综合日韩欧美亚洲| 最新中文字幕亚洲| 先锋影音久久久| 欧美激情免费观看| 国产日韩欧美电影在线观看| 亚洲成在人线av| 亚洲一区二区三区免费观看| 久久婷婷国产麻豆91天堂| 亚洲国产高清一区| 午夜久久久久久久久久一区二区| 久久综合激情| 国产目拍亚洲精品99久久精品| 激情懂色av一区av二区av| 夜夜精品视频一区二区| 久久五月激情| 亚洲午夜极品| 欧美日韩精品三区| 狠狠色狠狠色综合日日tαg| 亚洲一区二区动漫| 亚洲国产成人av|