parcomagic: security analysis of public terminals

14
PARCOMAGIC Security analysis of public terminals Denis Makrushin (@ difezza), Kaspersky Lab Stanislav Merzlyakov, Positive Technologies

Upload: denis-makrushin

Post on 05-Jul-2015

424 views

Category:

Technology


1 download

DESCRIPTION

A video game called Watch Dogs offers a realistic view on our near future – our surroundings filled to the brim with digital devices, machines which accept and dispense cash, and a variety of other connected things ridden with all sorts of vulnerabilities, which a hacker can exploit. In the game, the main character successfully compromises a video surveillance system using a smartphone, gaining the ability to conduct surveillance and obtain additional information. The game’s fans are divided: some say this is too ‘dystopian’ – taking a smartphone and hacking into everything around you. Others are somewhat skeptical, saying that things really aren’t that great and the game world is in many ways a reflection of real life. Below, we argue that devices in parks and other public spaces, which we often pass without giving them a second thought, may be vulnerable and therefore dangerous, at least for our personal finances. ZeroNights 2014 is an international conference dedicated to the practical side of information security.

TRANSCRIPT

Page 1: Parcomagic: Security analysis of public terminals

PARCOMAGICSecurity analysis of public terminals

Denis Makrushin (@difezza), Kaspersky Lab

Stanislav Merzlyakov, Positive Technologies

Page 2: Parcomagic: Security analysis of public terminals

WATCH OUT! WATCHDOGS.

2

Page 3: Parcomagic: Security analysis of public terminals

Common usage terminals

Page 4: Parcomagic: Security analysis of public terminals

Life is a good teacher

Page 5: Parcomagic: Security analysis of public terminals

Methodic of Penetration testing

Virtual keyboard

Moving in Control panel

Arbitrary code execution

Windows Help or Desktop

Input Data fuzzing

Tap-fuzzing

Escape from the application

Fullscreen application

Calling the additional elements of the

system’s interface

Calling the undocumented features of

the application

Page 6: Parcomagic: Security analysis of public terminals

View from the developer

Page 7: Parcomagic: Security analysis of public terminals

Street magic: escape from the app

Page 8: Parcomagic: Security analysis of public terminals

Street magic: virtual keyboard

Page 9: Parcomagic: Security analysis of public terminals

Who am I?

Page 10: Parcomagic: Security analysis of public terminals

Another kind of PoC

Page 11: Parcomagic: Security analysis of public terminals

Catch me!

Page 12: Parcomagic: Security analysis of public terminals

Post-exploitation

• Located in public places

• 24/7 available

• Same configuration

• The higher degree of

confidence from the user

• Connected to each other and to

private network

• Advertising

• Social engineering/phishing

• Botnet use cases

• Dump of app for offline

reversing

• Internal network attack

• …

Page 13: Parcomagic: Security analysis of public terminals

Take a look around

Firewall

Terminal’s

server

Main office