7 sins of atm
play

7 sins of ATM protection against logical attacks Timur Yunusov - PowerPoint PPT Presentation

7 sins of ATM protection against logical attacks Timur Yunusov Senior expert ptsecurity.com whoami Positive Technologies (from 2009) Application security researcher (from 2009) Banking systems


  1. Заголовок 7 sins of ATM protection against logical attacks Timur Yunusov Senior expert ptsecurity.com

  2. Заголовок whoami • Positive Technologies (from 2009) • Application security researcher (from 2009) • Banking systems security senior expert (from 2012) • Big fan of #nullcon • Always in search/research ;)

  3. Заголовок whoami • Positive Technologies (from 2009) • Application security researcher (from 2009) • Banking systems security senior expert (from 2012) • Big fan of #nullcon • Always in search/research ;) 10+ ATMs for the last year

  4. Заголовок ATM security assessment

  5. Заголовок 7 sins • Kiosk bypass techniques • Privilege escalation techniques • Application control software bypass • Network physical layer • Device management • OS / Software vulns / OS • Booting process Kiosk mode bypass • Logical vulnerabilities Network • Network attacks • Hardware attacks Hardware

  6. Заголовок Blackbox Blackbox is dead

  7. Заголовок Blackbox Blackbox is dead

  8. Заголовок Blackbox Have strong crypto btw dispenser and OS? Blackbox is (almost) Yes dead (for researchers) BB is not BB is possible possible

  9. Заголовок Kiosk mode bypass Kiosk mode bypass Windows XP/7

  10. Заголовок Kiosk mode bypass • Safe mode • Hotkeys • Windows Plug&Play • Race condition

  11. Заголовок Safe mode • F8 + Safe mode with command line • DS restore mode • AC/DC fun

  12. Заголовок Hotkeys • Win+R

  13. Заголовок Hotkeys • Win+R • Alt+Tab • Alt+F4 • Alt+Shift+ESC • F1-F12 • Shift x5 (Windows 7 only) • Win+(etc) http://www.techrepublic.com/blog/windows-and-office/the- complete-list-of-windows-logo-keyboard-shortcuts/

  14. Заголовок AlwaysOnTop This ATM is Out Of Service, Sorry for inconvenience

  15. Заголовок AlwaysOnTop This ATM is Out Of Service, Sorry for inconvenience • Disabling mouse icon • AlwaysOnTop

  16. Заголовок P&P

  17. Заголовок P&P

  18. Заголовок P&P video/screenshot

  19. Заголовок End of the story

  20. Заголовок Privilege escalation techniques • How exactly we extract money?

  21. Заголовок Privilege escalation techniques • FS restrictions • Local Security Policy restrictions

  22. Заголовок Privilege escalation techniques • Arbitrary command execute - XFS API • Command execute - priv escalation • Write files/registry - modify sec configs

  23. Заголовок Privilege escalation techniques • Arbitrary command execute - XFS API • Command execute - priv escalation • Write files/registry - modify sec configs • Read files - ***

  24. Заголовок App control software bypass Story so far… • https://evi1cg.me/archives/AppLocker_Bypass_Techniques.html • https://cansecwest.com/slides/2016/CSW2016_Freingruber_Bypassi ng_Application_Whitelisting.pdf

  25. Заголовок Security software bypass • McAfee Solidcore - https://www.ptsecurity.com/ww-en/about/news/131496/ • MS Applocker - http://www.blackhillsinfosec.com/?p=5257 – State of Art! • etc (6 total different products) – stay tuned! • 0days (5 total, in process of fixing): network, local, logical • Misconfiguration • Whitelist Memory Execution: IE, rundll32, powershell, java, etc

  26. Заголовок Security software bypass

  27. Заголовок Network • Processing • Track2 • OS services • Software services (Solidcore, UPDD, etc) • Processing • Track2 VPN TLS MAC + Firewall • Processing

  28. Заголовок Network vulns • VPN disabling • Logical vulns part • TLS disabling • MAC disabling • Files/registry manipulations

  29. Заголовок Network/Hardware layer • 3G industrial modem • Long story short http://blog.ptsecurity.com/2015/12/critical- vulnerabilities-in-3g4g-modems.html • Security measures • VPN channel • Private APN • Result • ATM network infection • Processing access

  30. Заголовок Network/Hardware layer • Access to *:80 • Auth bypass • Physical access • Proper VPN protocols(((

  31. Заголовок Device mgmt How to do all hacking stuff much easier?

  32. Заголовок Device mgmt • Keyboard/mouse • Teensy • Network card • fw bypass • plug&play • USB drive • local access to Exe file content • plug&play • MS13-081

  33. Заголовок Booting process The easiest way is…

  34. Заголовок Booting process • BIOS pwd • Network load • Safe mode • Physical access • OS access • Same passwords story • Bootkit • Software skimming

  35. Заголовок Logical vulns How it happened?

  36. Заголовок Logical vulns • Security tools runs from regedit/autorun • Shift x5 • Win+U • Security race condition • Hash(loooooooong file) • exploit.exe at the same time • Ctrl+C

  37. Заголовок Logical vulns

  38. Заголовок Logical vulns • VPN disabling

  39. Заголовок Logical vulns • FS access is strictly prohibited

  40. Заголовок Logical vulns • FTP is strictly prohibited!

  41. Заголовок Summary Windows 7 SP1 ATM Windows XP SP3 ATM Kiosk bypass Hotkeys/Safe mode KeyboardDisabler bypass App control bypass 0day/Trusted soft Untrusted booting Privilege escalation 0day/MS15-051 Untrusted booting VPN/TLS disabling Misconfiguration/FS Untrusted booting Social Engineering Misconfiguration/FS - Untrusted boot BIOS accessing from OS No password Network attacks MAC/TLS/VPN/App service MAC/TLS/VPN/OS services

  42. Заголовок How all that happens? • Security through obscurity is not an option! • You should know your landscape and your threat model • Use compliance management tools instead of paper • In case of impossibility of fixing vulns, use mitigation measures like SIEM

  43. Заголовок Greetz • Anon guy ;-) • Positive Technologies researchers teams: • ICS/SCADA • Reverse Engineering • Banking security

  44. Заголовок Contacts http://uk.linkedin.com/in/tyunusov tyunusov@ptsecurity.com a66at

  45. Заголовок Thank You! ptsecurity.com

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend