Friday, July 30, 2010

With bright just Drain Content Can Flash Disk ATM

It turns out the defense and security systems are not as solid as an ATM machine that many predicted the layman, the evidence is only a flash disk with a capital of just an ATM can be ordered to spend all his money, here's what could be discussed by a former hacker who is now a security consultant, Barnaby Jack's, reveals a new way breaking into automatic teller machine (ATM). Jack who is now a research director at security consulting firm, IOActive Labs, ATM hacking techniques exhibited in the annual gatherings of hackers, Black Hat, Las Vegas, Wednesday (28 / 7).


"I wish I could change the way people look upon these devices (ATMs), which from the outside looks impenetrable," said Jack in front of the audience prior to demonstrating how to break into the ATM. To be able to break into the ATM, he admitted spending more than a year to study damage and breaking into ATM machines are often found in gas stations, bars and retail companies.

As quoted from REUTERS, yesterday, In order to know the ins and outs of the ATM, Jack to buy their own ATM machines over the Internet. At the annual Black Hat conference, Jack shows how he upload homemade software called Dillinger.

After infecting the ATM machine, the software will be approached Dillinger and instruct the machine to start spending cash. Dillinger's name refers to the legendary figure of the United States robber, John Dillinger. While the software is made by the company for ATM Tranax Technologies.

Jack uses keys that are available on the internet to open the box which is protected Triton ATM System. Then by entering the flasks containing the software disk into the USB slot Dillinger, it will force all the ATMs spewing cash in it. ATM is broken into Jack using the Windows CE device, an artificial version of the operating system micr * soft Corp., which is widely used on specific computer, including ATMs.

Jack says, the ATM maker actually has to make software that can prevent the hackers to repeat the same pattern of attack, like he did on the stage at the time. Yet he also emphasized that the ATM is still vulnerable from attacks by hackers. "I'm not naive enough to declare that I am the only person who can do this," he said.

Jack added, he was sure the ATM is used by financial institutions is also vulnerable to attack hackers. But he could not simulate the attacks because he has not been able to get the ATM from any bank.

Meanwhile, deputy director of engineering for Triton, Bob Douglas, says she is not aware of any successful attacks carried out on devices made by companies.

About 6,000 hackers and security professionals attending this week's Black Hat conference to discuss the vulnerability in all respects, ranging from software that uses a PC, mobile phone, until the systems that control the electrical network.

Many organizers to promote research in an attempt to publicize the weaknesses device for users, so they can protect themselves and encourage software makers, producers and other parties to find a way to fix this vulnerability.
A science is basically like a knife, could have the dual function, for good or bad depending on the host where the science was residing, would be beneficial to be okay.

No comments:

Post a Comment