Apparently security defense system is not as solid as an ATM machine that many predicted a layman, the only evidence was the flash disk with a capital of just an ATM can be ordered to spend all his money, this is what was discussed by a former hacker who is now a security consultant, Barnaby Jack, reveals a new way break into the Automatic Teller Machine (ATM).
Jack who is now a research director at security consulting firm, IOActive Labs, showing off technique to break into ATM in the event the annual meeting of the hackers, Black Hat in Las Vegas.
"I wish I could change the way people on these devices (ATM) from the outside looks impenetrable," said Jack in front of an audience before demonstrating how to break into the ATM. To be able to break into the ATM, he admitted spending more than a year to study damage and breaking into ATM machines are often found in gas stations, bars and retail establishments.
As quoted from Reuters, yesterday, In order to know the ins and outs of the ATM, Jack to buy their own ATM machines over the internet. At the annual Black Hat conference, Jack shows how he upload homemade software called Dillinger
Former hacker Barnaby Jack presented the only way to break into an ATM machine with a flash disk at a conference of the Black Hat hacker world
After infecting an ATM machine, software Dillinger will approach and instruct the machine to start spending the cash. Dillinger name refers to the legendary figure of U.S. robber, John Dillinger. While the software is made by the company for ATM Tranax Technologies.
Jack using the keys available on the internet to open the protected Triton ATM System. Then by inserting the disk containing the software Dillinger flask into a USB slot, it will force the ATM spit out all the cash in it. ATM burglarized Jack uses a Windows CE device, a version of the operating system made by Microsoft Corp. that is widely used on a particular computer, including ATMs.
Jack said, the ATM maker has actually made the software that can prevent the hackers to repeat the same pattern of attack, as he did on stage at the time. But he also asserted that the ATM is still vulnerable to hacker attacks. "I am not naive enough to declare that I am the only person who can do this," he said.
He added that he believes the ATM used by financial institutions are also vulnerable to hacker attack. But he has not been able to simulate the attack because he had not been able to get the ATM of any bank.
While Triton's deputy technical director, Bob Douglas, said he was not aware of any successful attacks carried out against the device that created the company.
Some 6,000 hackers and security professionals attending this week's Black Hat conference to discuss the vulnerabilities in all things, from software that uses a PC, mobile phone, until the system that controls the power grid.
Many of the organizers to promote such research in an effort to publicize flaws devices for users, so they can protect themselves and encourage software makers, producers and other parties to find a way to fix these vulnerabilities.
A science is basically like a knife, can double, for better or worse depending on the host where the science was residing, would be utilized to be.
After infecting an ATM machine, software Dillinger will approach and instruct the machine to start spending the cash. Dillinger name refers to the legendary figure of U.S. robber, John Dillinger. While the software is made by the company for ATM Tranax Technologies.
Jack using the keys available on the internet to open the protected Triton ATM System. Then by inserting the disk containing the software Dillinger flask into a USB slot, it will force the ATM spit out all the cash in it. ATM burglarized Jack uses a Windows CE device, a version of the operating system made by Microsoft Corp. that is widely used on a particular computer, including ATMs.
Jack said, the ATM maker has actually made the software that can prevent the hackers to repeat the same pattern of attack, as he did on stage at the time. But he also asserted that the ATM is still vulnerable to hacker attacks. "I am not naive enough to declare that I am the only person who can do this," he said.
He added that he believes the ATM used by financial institutions are also vulnerable to hacker attack. But he has not been able to simulate the attack because he had not been able to get the ATM of any bank.
While Triton's deputy technical director, Bob Douglas, said he was not aware of any successful attacks carried out against the device that created the company.
Some 6,000 hackers and security professionals attending this week's Black Hat conference to discuss the vulnerabilities in all things, from software that uses a PC, mobile phone, until the system that controls the power grid.
Many of the organizers to promote such research in an effort to publicize flaws devices for users, so they can protect themselves and encourage software makers, producers and other parties to find a way to fix these vulnerabilities.
A science is basically like a knife, can double, for better or worse depending on the host where the science was residing, would be utilized to be.
source: http://wisbenbae.blogspot.com/2011/08/cara-membobol-atm-dengan-flashdisk.html
I appreciate you taking the time to write this post. It continues to be quite beneficial to me indeed. Value it.
ATM Machines