14
PARCOMAGIC Security analysis of public terminals Denis Makrushin (@ difezza), Kaspersky Lab Stanislav Merzlyakov, Positive Technologies

Parcomagic: Security analysis of public terminals

Embed Size (px)

DESCRIPTION

A video game called Watch Dogs offers a realistic view on our near future – our surroundings filled to the brim with digital devices, machines which accept and dispense cash, and a variety of other connected things ridden with all sorts of vulnerabilities, which a hacker can exploit. In the game, the main character successfully compromises a video surveillance system using a smartphone, gaining the ability to conduct surveillance and obtain additional information. The game’s fans are divided: some say this is too ‘dystopian’ – taking a smartphone and hacking into everything around you. Others are somewhat skeptical, saying that things really aren’t that great and the game world is in many ways a reflection of real life. Below, we argue that devices in parks and other public spaces, which we often pass without giving them a second thought, may be vulnerable and therefore dangerous, at least for our personal finances. ZeroNights 2014 is an international conference dedicated to the practical side of information security.

Citation preview

Page 1: Parcomagic: Security analysis of public terminals

PARCOMAGICSecurity analysis of public terminals

Denis Makrushin (@difezza), Kaspersky Lab

Stanislav Merzlyakov, Positive Technologies

Page 2: Parcomagic: Security analysis of public terminals

WATCH OUT! WATCHDOGS.

2

Page 3: Parcomagic: Security analysis of public terminals

Common usage terminals

Page 4: Parcomagic: Security analysis of public terminals

Life is a good teacher

Page 5: Parcomagic: Security analysis of public terminals

Methodic of Penetration testing

Virtual keyboard

Moving in Control panel

Arbitrary code execution

Windows Help or Desktop

Input Data fuzzing

Tap-fuzzing

Escape from the application

Fullscreen application

Calling the additional elements of the

system’s interface

Calling the undocumented features of

the application

Page 6: Parcomagic: Security analysis of public terminals

View from the developer

Page 7: Parcomagic: Security analysis of public terminals

Street magic: escape from the app

Page 8: Parcomagic: Security analysis of public terminals

Street magic: virtual keyboard

Page 9: Parcomagic: Security analysis of public terminals

Who am I?

Page 10: Parcomagic: Security analysis of public terminals

Another kind of PoC

Page 11: Parcomagic: Security analysis of public terminals

Catch me!

Page 12: Parcomagic: Security analysis of public terminals

Post-exploitation

• Located in public places

• 24/7 available

• Same configuration

• The higher degree of

confidence from the user

• Connected to each other and to

private network

• Advertising

• Social engineering/phishing

• Botnet use cases

• Dump of app for offline

reversing

• Internal network attack

• …

Page 13: Parcomagic: Security analysis of public terminals

Take a look around

Firewall

Terminal’s

server

Main office