Transcript
Page 1: Parcomagic: Security analysis of public terminals

PARCOMAGICSecurity analysis of public terminals

Denis Makrushin (@difezza), Kaspersky Lab

Stanislav Merzlyakov, Positive Technologies

Page 2: Parcomagic: Security analysis of public terminals

WATCH OUT! WATCHDOGS.

2

Page 3: Parcomagic: Security analysis of public terminals

Common usage terminals

Page 4: Parcomagic: Security analysis of public terminals

Life is a good teacher

Page 5: Parcomagic: Security analysis of public terminals

Methodic of Penetration testing

Virtual keyboard

Moving in Control panel

Arbitrary code execution

Windows Help or Desktop

Input Data fuzzing

Tap-fuzzing

Escape from the application

Fullscreen application

Calling the additional elements of the

system’s interface

Calling the undocumented features of

the application

Page 6: Parcomagic: Security analysis of public terminals

View from the developer

Page 7: Parcomagic: Security analysis of public terminals

Street magic: escape from the app

Page 8: Parcomagic: Security analysis of public terminals

Street magic: virtual keyboard

Page 9: Parcomagic: Security analysis of public terminals

Who am I?

Page 10: Parcomagic: Security analysis of public terminals

Another kind of PoC

Page 11: Parcomagic: Security analysis of public terminals

Catch me!

Page 12: Parcomagic: Security analysis of public terminals

Post-exploitation

• Located in public places

• 24/7 available

• Same configuration

• The higher degree of

confidence from the user

• Connected to each other and to

private network

• Advertising

• Social engineering/phishing

• Botnet use cases

• Dump of app for offline

reversing

• Internal network attack

• …

Page 13: Parcomagic: Security analysis of public terminals

Take a look around

Firewall

Terminal’s

server

Main office


Recommended