青青草原综合久久大伊人导航_色综合久久天天综合_日日噜噜夜夜狠狠久久丁香五月_热久久这里只有精品

Michael's Space

Technology changes the world, serves the people.
  C++博客 :: 首頁 :: 新隨筆 :: 聯系 :: 聚合  :: 管理
Source: http://www.wired.com/threatlevel/2010/07/atms-jackpotted/

Researcher Demonstrates ATM ‘Jackpotting’ at Black Hat Conference

LAS VEGAS — In a city filled with slot machines spilling jackpots, it was a “jackpotted” ATM that got the most attention Wednesday at the Black Hat security conference, when researcher Barnaby Jack demonstrated two suave hacks against automated teller machines that made them spew out dozens of crisp bills.

The audience greeted the demonstration with hoots and applause.

In one of the attacks, Jack reprogrammed the ATM remotely over a network, without touching the machine; the second attack required he open the front panel and plug in a USB stick loaded with malware.

Jack, director of security research at IOActive Labs, focused his hack research on standalone and hole-in-the-wall ATMs — the kind installed in retail outlets and restaurants. He did not rule out that bank ATMs could have similar vulnerabilities, but he hasn’t yet examined them.

The two systems he hacked onstage were made by Triton and Tranax. The Tranax hack was conducted using an authentication bypass vulnerability that Jack found in the system’s remote monitoring feature, which can be accessed over the internet or dial-up, depending on how the owner configured the machine.

Tranax’s remote monitoring system is turned on by default, but Jack said the company has since begun advising customers to protect themselves from the attack by disabling the remote system.

To conduct the remote hack, an attacker would need to know an ATM’s IP address or phone number. Jack said he believes about 95 percent of retail ATMs are on dial-up; a hacker could war dial for ATMs connected to telephone modems, and identify them by the cash machine’s proprietary protocol.

The Triton attack was made possible by a security flaw that allowed unauthorized programs to execute on the system. The company distributed a patch last November so that only digitally signed code can run on them.

Both the Triton and Tranax ATMs run on Windows CE.

Using a remote attack tool, dubbed Dillinger, Jack was able to exploit the authentication-bypass vulnerability in Tranax’s remote monitoring feature and upload software or overwrite the entire firmware on the system. With that capability, he installed a malicious program he wrote, called Scrooge.

Scrooge lurks on the ATM quietly in the background until someone wakes it up in person. It can be initiated in two ways — either through a touch-sequence entered on the ATM’s keypad or by inserting a special control card. Both methods activate a hidden menu an attacker can use to make the machine spew out money or print receipts. Scrooge will also capture magstripe data embedded in bank cards other users insert into the ATM.

To demonstrate, Jack punched keys on the keypad to call up the menu, then instructed the machine to spit out 50 bills from one of four cassettes. The screen lit up with the word “Jackpot!” as the bills came flying out the front.

To hack the Triton, he used a key to open the machine’s front panel, then connected a USB stick containing his malware. The ATM uses a uniform lock on all of its systems — the kind used on filing cabinets — that can be opened with a $10 key available on the web. The same key opens every Triton ATM.

Two Triton representatives said at a press conference after the presentation that its customers preferred a single lock on systems so they could easily manage fleets of machines without requiring numerous keys. But they said Triton offers a lock upgrade kit to customers who request it — the upgraded lock is a Medeco pick-resistant, high-security lock.

Similar malware attacks were discovered on bank ATMs in Eastern Europe last year. Security researchers at Trustwave, based in Chicago, found the malware on 20 machines in Russia and Ukraine that were all running Microsoft’s Windows XP operating system. They said they found signs that hackers were planning on bringing their attacks to machines in the United States. The malware was designed to attack ATMs made by Diebold and NCR.

Those attacks required an insider, such as an ATM technician or anyone else with a key to the machine, to place malware on the ATM. Once that was done, attackers could insert a control card into the machine’s card reader to trigger the malware and give them control of the machine through a custom interface and the ATM’s keypad.

The malware captured account numbers and PINs from the machine’s transaction application and then delivered it to the thief on a receipt printed from the machine in an encrypted format, or to a storage device inserted in the card reader. A thief could also instruct the machine to eject whatever cash was inside the machine. A fully loaded bank ATM can hold up to $600,000.

Earlier this year, in a separate incident, a Bank of America employee was charged with installing malware on his employer’s ATMs that allowed him to withdraw thousands of dollars without leaving a transaction record.

Jack was slated to give the same ATM vulnerability talk at Black Hat last year, but his then-employer Juniper Networks canceled the talk weeks before the conference after an unnamed ATM vendor expressed concern. He said on Wednesday that the earlier talk was withdrawn to allow Triton time to implement a patch to address the code-execution vulnerability targeted in his demonstration. The company released the patch eight months ago.

Jack said that so far he’s examined ATMs made by four manufacturers and all of them have vulnerabilities. “Every ATM I’ve looked at allows that ‘game over.’ I’m four for four,” he said at the press conference. He wouldn’t discuss the vulnerabilities in the two ATMs not attacked on Wednesday because he said his previous employer, Juniper Networks, owns that research.

Jack said his aim in demonstrating the hacks is to get people to look more closely at the security of systems that are presumed to be locked down and impenetrable.

Photo: Isaac Brekken/Associated Press



Read More http://www.wired.com/threatlevel/2010/07/atms-jackpotted/#ixzz0vAgMMN79

青青草原综合久久大伊人导航_色综合久久天天综合_日日噜噜夜夜狠狠久久丁香五月_热久久这里只有精品
  • <ins id="pjuwb"></ins>
    <blockquote id="pjuwb"><pre id="pjuwb"></pre></blockquote>
    <noscript id="pjuwb"></noscript>
          <sup id="pjuwb"><pre id="pjuwb"></pre></sup>
            <dd id="pjuwb"></dd>
            <abbr id="pjuwb"></abbr>
            久久久夜色精品亚洲| 亚洲欧洲日本mm| 一区福利视频| 亚洲精品久久久久久久久久久久久| 亚洲精品一区二区三区福利| 欧美高清视频在线| 亚洲综合视频一区| 欧美精品电影在线| 极品中文字幕一区| 欧美ed2k| 欧美一站二站| 国产精品外国| 亚洲调教视频在线观看| 麻豆乱码国产一区二区三区| 亚洲一区二区精品视频| 欧美本精品男人aⅴ天堂| 国产亚洲一区二区三区| 亚洲性感美女99在线| 亚洲国产影院| 麻豆国产精品777777在线| 久久精品噜噜噜成人av农村| 国产精品毛片高清在线完整版| 亚洲福利在线视频| 久久综合九色综合久99| 午夜精彩国产免费不卡不顿大片| 欧美日韩视频第一区| 99在线精品免费视频九九视| 欧美激情亚洲精品| 免费成人黄色av| 亚洲国内自拍| 亚洲第一区中文99精品| 免费在线欧美视频| 亚洲精品123区| 亚洲午夜久久久久久久久电影网| 欧美丝袜第一区| 亚洲欧美在线网| 亚洲一区二区在线看| 在线精品在线| 欧美激情精品| 国产精品美腿一区在线看 | 欧美日本精品在线| 亚洲精品资源| 亚洲人精品午夜| 欧美日韩国产成人| 亚洲一区久久久| 亚洲综合999| 99精品视频免费观看| 日韩亚洲视频| 国产免费一区二区三区香蕉精| 欧美亚洲自偷自偷| 欧美亚洲在线| 亚洲激情网址| 久久久久久久一区| 亚洲美女视频在线观看| 久久国内精品视频| 亚洲人成高清| 久久久久久久久综合| 久久国产精彩视频| 女人天堂亚洲aⅴ在线观看| 久久久视频精品| 国产欧美亚洲视频| 亚洲激情国产| 国产农村妇女毛片精品久久莱园子| 亚洲国产精品精华液网站| 国产中文一区二区| 日韩视频精品| 中日韩美女免费视频网址在线观看 | 欧美在线观看视频一区二区| 亚洲欧美国产高清| 久久久亚洲国产天美传媒修理工| 午夜老司机精品| 欧美亚洲成人精品| 欧美成人在线免费视频| 亚洲高清在线观看一区| 久久深夜福利免费观看| 亚洲综合社区| 国产精品久久久久久久久久久久| 狂野欧美一区| 曰本成人黄色| 午夜精品视频一区| 一本色道久久综合亚洲精品不 | 欧美色大人视频| 一区二区三区欧美日韩| 在线精品国精品国产尤物884a| 欧美在线播放| 欧美大胆a视频| 夜夜爽99久久国产综合精品女不卡| 欧美黄在线观看| 欧美大片va欧美在线播放| 亚洲欧洲在线观看| 欧美天堂在线观看| 亚洲尤物精选| 欧美成人中文| 亚洲午夜羞羞片| 国产一区二区三区日韩欧美| 久久久久久久一区二区| 亚洲久久一区二区| 亚洲肉体裸体xxxx137| 欧美日韩在线观看一区二区| 亚洲免费视频观看| 欧美不卡视频一区| 亚洲影音一区| 在线观看成人一级片| 欧美精品一区二区三区一线天视频 | 亚洲精品午夜| 国产欧美一区二区精品秋霞影院| 久久精品国产欧美亚洲人人爽| 亚洲第一久久影院| 欧美一区二区日韩| 国产毛片一区| 欧美精品一区二区在线播放| 午夜在线观看欧美| 亚洲精品视频在线观看网站| 久久夜色精品亚洲噜噜国产mv | 欧美亚一区二区| 久久久亚洲国产天美传媒修理工 | 欧美影视一区| 日韩视频―中文字幕| 久久综合久久美利坚合众国| 中文一区二区| 亚洲黄色一区| 国内久久精品视频| 国产精品区一区| 欧美日韩亚洲在线| 欧美α欧美αv大片| 欧美一区二区视频网站| 宅男精品导航| 久久久精品国产99久久精品芒果| 国产精品一区二区a| 欧美精品三级在线观看| 久久偷看各类wc女厕嘘嘘偷窃| 亚洲一区在线视频| 99re热这里只有精品视频| 欧美激情视频在线播放 | 亚洲欧美另类中文字幕| 亚洲人屁股眼子交8| 在线免费观看日本一区| 国内免费精品永久在线视频| 国产欧美一区二区三区国产幕精品 | 欧美成人精品在线播放| 久久一二三四| 久久男人资源视频| 久久久久国内| 久久久综合网站| 久久天天躁狠狠躁夜夜爽蜜月| 久久九九热免费视频| 久久99伊人| 欧美在线一区二区三区| 久久av二区| 久久久亚洲国产美女国产盗摄| 久久精品夜色噜噜亚洲a∨| 久久精品亚洲一区| 日韩一区二区免费看| 亚洲破处大片| 在线一区欧美| 亚洲大片免费看| 欲色影视综合吧| 91久久久一线二线三线品牌| 亚洲人体1000| 9色精品在线| 亚洲一区在线免费| 久久九九热re6这里有精品 | 日韩一二三在线视频播| 亚洲免费成人av| 亚洲天堂男人| 久久aⅴ乱码一区二区三区| 久久男女视频| 欧美国产91| 这里只有精品在线播放| 性8sex亚洲区入口| 久久夜色精品| 欧美日韩成人综合在线一区二区 | 久久精品系列| 欧美精品首页| 国产乱码精品一区二区三区忘忧草| 国产日韩欧美一区| 欧美视频在线播放| 国产综合网站| 亚洲开发第一视频在线播放| 亚洲欧美国产三级| 免费亚洲电影在线| 欧美成人第一页| 亚洲精品日韩在线观看| 午夜精品99久久免费| 久久久另类综合| 欧美视频免费在线| 在线观看成人av| 午夜精品久久久久久久白皮肤 | 国产精品99久久99久久久二8| 久久成人国产精品| 亚洲精品日产精品乱码不卡| 小处雏高清一区二区三区| 欧美激情综合色综合啪啪| 国产婷婷色一区二区三区| 亚洲精品视频在线| 噜噜噜久久亚洲精品国产品小说| 亚洲精品免费一区二区三区| 久久精品国产精品亚洲综合| 欧美视频国产精品| 亚洲精品国产品国语在线app|