The presentation discusses vulnerabilities in point-of-sale terminals and how they can be weaponized for fraudulent transactions. The focus is on Ingenico pin pads and their weaknesses in terms of software components.
- Point-of-sale terminals have vulnerabilities that can be exploited to gain access to internal FTP servers and manipulate traffic between the point of sale and the acquire.
- Ingenico pin pads have several vulnerabilities, including the use of an insecure protocol for opening FTP servers and a trace mode with no authentication or encryption.
- Cloning terminals is possible by stealing various keys, allowing for fraudulent transactions and money movements.
- The presentation also discusses how the new payment rules in Europe can be bypassed using modified terminals.
- The vendor took two years to confirm and fix the vulnerabilities, but it is unclear how well they were actually fixed.
The algorithm for pin entry on most point-of-sale terminals is not as secure as one might think. The pin pad sends the pin directly to the main operating system, where it can be accessed by malware before encryption. This allows hackers to obtain pin codes and track 2 data before they are encrypted and carry out fraudulent transactions.