Credit Card Networks Revisited: Penetration in Real-Time By Robert Imhoff-Dousharm.

Slides:



Advertisements
Similar presentations
Copyright © 2008 Affiniscape. All rights reserved. RECONCILIATION ROUND UP How to rope in credit cards for your association.
Advertisements

Credit Card Processing 101
Four ways to give electronically 1. Making it easy for givers to give! 2.
Scan Checks Remotely Electronically Deposit and Clear YOU GET YOUR MONEY FASTER Your Location Bank.
© 2007 First Data Corporation. All Rights Reserved. This document contains unpublished, confidential and proprietary information of First Data Corporation.
The Loyalty Card Program
[FI Name]s Merchant Services Program Employee Training Presentation.
Reservations PowerPoint Presentation Prepared by NFS Please follow the instructions at the top of each slide. Click anywhere to begin.
Copyright © Open Text Corporation. All rights reserved. Slide 1 Automatic Routing With Captaris FaxPress and FaxPress Premier Darin McGinnes Sales Engineer.
3 EASY STEPS TO LAUNCH YOUR PROGRAM The Bank announces the Rewards Program on their Website and through cardholder Online Banking. Step 1 We publish Your.
Recruitment Booster.
“Find out what you don’t know…”. Agenda Introduction To disclose or not to disclose What is Defcon Defcon 12 Presentations The Future Questions.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
AcqENGIN Functional Review © 2010 M2. All rights reserved.
HCE AND BLE UNIVERSITY TOMORROWS TRANSACTIONS LONDON, 20 TH MARCH 2014.
Unit 11 Using the Internet & Browsing the Web.  Define the Internet and the Web  Set up & troubleshoot an Internet connection  Categorize webs sites.
NextGen Trustee Reports This class will review NextGen Trustee reports and how to run them. We will cover which reports are best suited for various needs.
Biller Direct Getting Started
MAKE LOAN REPAYMENTS ON A CLIENT LOAN ACCOUNT. 2 1.
ATM TEXT INTEGRATION INTORDUCTION. CurrentSolutionCurrentSolution Method of textintegration textintegration Schedule ATM TEXT INTEGRAION is a very popular.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) SriramGopinath( )
Joe SimonettiT-FLEx Workshop T-FLEx October Workshop The Future of Fare Collection Bank Card Transactions & Merchant Processing Joseph Simonetti October.
Examining IP Header Fields
Analysis of Attack By Matt Kennedy. Different Type of Attacks o Access Attacks o Modification and Repudiation Attacks o DoS Attacks o DDoS Attacks o Attacks.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
Beyond Security Ltd. Port Knocking Beyond Security Noam Rathaus CTO Sunday, July 11, 2004 Presentation on.
Become an ePay Program Payments Expert!
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 5: Inter-VLAN Routing Routing And Switching.
Guide to TCP/IP, Second Edition1 Guide To TCP/IP, Second Edition Chapter 8 The Dynamic Host Configuration Protocol (DHCP)
JMU GenCyber Boot Camp Summer, Network Sniffing Sometimes it is possible observe/record traffic traveling on a network Network traffic may contain.
Guide to TCP/IP, Third Edition Chapter 8: The Dynamic Host Configuration Protocol.
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
PA3: Router Junxian (Jim) Huang EECS 489 W11 /
COEN 252 Computer Forensics Collecting Network-based Evidence.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) Sriram Gopinath( )
DO NOW:  Take packet:  Review the bank statement on page 3 of the packet.  In your notebook: What items does a bank statement include?
Module 12: Routing Fundamentals. Routing Overview Configuring Routing and Remote Access as a Router Quality of Service.
Sample University Guided Session: Information Literacy.
SNORT Feed the Pig Vicki Insixiengmay Jon Krieger.
RESULTS Training Carbon Offset Reporting to RESULTS Sept 2013.
Guide to TCP/IP, Third Edition Chapter 8: The Dynamic Host Configuration Protocol.
1 Introduction to Malcode, DoS Attack, Traceback, RFID Security Cliff C. Zou 03/02/06.
Network Sniffer Anuj Shah Advisor: Dr. Chung-E Wang Department of Computer Science.
PAYWARE MOBILE API – APP TO APP INTEGRATION. PAYWARE MOBILE API OVERVIEW VeriFone’s PAYware Mobile API provides iPhone developers the ability to easily.
VeriFone Virtual Terminal Web-Hosted Hosted Payment Gateway
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Purpose  The purpose of the cross box handoff feature is to make the.
INTRODUCTION TO SIM.DLL AGENDA SIM.DLL Overview and Features SIM.DLL Requirements Supported Terminals Transaction Flow Benefits.
SECURE INTEGRATION METHOD (SIM) Device Control SIM DEVICE CONTROL The SIM controls the flow of all sensitive cardholder data (card, track, exp. date,
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
WIRESHARK Lab#3. Computer Network Monitoring  Port Scanning  Keystroke Monitoring  Packet sniffers  takes advantage of “friendly” nature of net. 
Salient features of facility:  Minimum amount of withdrawal Rs.100/- (thereafter in multiples of Rs.100/- ).  Maximum of Rs.1000/- per day per.
CREDIT CARD PAYMENT SYSTEM System involves Several major participants Purchaser that is cardholder Card Issuer that issues credit card Merchant that makes.
Network Devices and Firewalls Lesson 14. It applies to our class…
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Trusted source for all your payment processing needs.
Paytm App is your one-stop destination for all your needs
How to Process a Credit Card SALE Transaction in PCCharge
Advanced Penetration testing
Hardware Addressing and Frame Type Identification
Wireshark Lab#3.
Sage (Accpac) Partner since 1999 Sage Gold Development Partner
Mastercard Location Alerts™
CS222 Web Programming Course Outline
Advanced Penetration testing
Chapter 8: Monitoring the Network
Device Collectives to Share Resources
Computer Networks ARP and RARP
Presentation transcript:

Credit Card Networks Revisited: Penetration in Real-Time By Robert Imhoff-Dousharm

About the Presentation This interacitve demonstration will give first hand experience in understanding and searching out credit card traffic on TCP/IP networks. It will also demonstrate how to deconstruct, rebuild and transmit rouge credit card packets. As an added bonus, prizes will be handed out to those who can craft and transmit rouge packets by end of speech. My incentives and guidance will illustrate how vulnerable credit card data is on merchant networks.

Background Information History of the Credit Card 1961 – Diners Club 1971 Bankamericard 1971 Master Card 1987 Discover Card

History (cont) F.E.P Bankamericacards's problem The first F.E.P. - VisaNet Methods of connections Current F.E.P's role Industry Leaders

History (cont) Credit Card Networks General Flow of Credit Card Traffic Connection Methods Discriminating Traffic

Credit Card Network Topology Simple Network Design Flows Seamlessly Easy to Troubleshoot Point of Sale (POS) Onsite Credit Card Software Front End Processor

Definitions F.E.P – Front End Processor LuhnMod – Credit Card Checksum Algorythm Back End – Merchant Aquirerer's Network Issuer – Merchant Clients Bank Authorization Code – 6 digit code ; pre- authorization confirmation number Merchant ID – Unique ID issued to any merchant that accepts credit cards Terminal ID – Unique ID issued to merchant for each terminal in use at site

Credit Card Packets Offset Based Packet Type Indicators Field Separators STX/ETX/LRC Credit Card Data

Finding Packets What's required: Packet Sniffer (ethereal, libpcap, etc) Wi-Fi Card that supports sniffing Programing language (we will use php)

Rules of Engagement Connecting to our AP We reserve the right to capture and save YOUR traffic No network flooding Prizes Grand Prize - $50 Bar Tab (TBD location), Credit Card Network T-Shirt Runner up's – Credit Card Network T-Shirts, bumper stickers

Finding Packets (cont) 1)Activating AP's 2)Turning On Authorization Host 3)Turning on Packet Generator 4)Turning on Accounting Software

Initial Packet Analysis Reviewing Packets Writing program to hunt though packets for unique data (like exp dates and credit cards) Q/A on current packets seen in capture

Generating Rouge Packet Q/A for people not attacking network Assistance for attcking group (helpers will walk around to assist any of your questions about network and credit card traffic)

Credit Card Newbies Guide How do we look for a packet What's in a packet How do we craft a rouge packet What do we send it this packet Understanding fundamentals of packets Writing code to disect packets

Hints and Tips Hints on trapping and understanding credit card packets Hints on crafting a packet at the programming level (using array's and string buffers) Hints (and example PHP code) on transmitting packets from programming code across TCP/IP network

Logical Packet Analysis Theory – If you are looking for credit card data in a packet, you should parse and search the packet for a credit card number and expiration date. Application – Use common logic and standard utilities to find static data in packet: merchant id, card number, expiration date, dollar amount Example Application – If an expiration date is in fixed range – 4 digits, two digit month, two digit year – look for numbers only in packet where they extend into 4 offsets of string. Use basic logic. If a expiration date will always begain with 01 through 12 (numeric month values), the first two digits you are looking for should be in this range. Next, expiration dates year is usually NOT BEFORE the current year, nor past 10 years from now.

PHP Example – Expiration Date <?php $range = array(01, 02, 03, 04, 05, 06, 07, 08, 09, 10, 11, 12); $string = data; $count = strlen($string); for($i=0; $i<$count; $i++) { foreach($range as $month) { if(substr(string, $i, 2)==$month) { foreach($range as $year) { if(substr($string, $i+2, 2)==$year) { echo Possible Exp date:.substr($string, $i, 2)./. substr($string, $i+2, 2); } ?>

Credit Card Packet Analysis Questions and Answers

Conclusion Inseption of credit cards Initial shortfalls of F.E.P's New problems with inseption of credit card networks What the future hold for the industry