hacking hotel keys - def con con 24/def con 24 presentations/def… · hacking hotel keys security...

37
And Point of Sale Systems HACKING HOTEL KEYS Security Consultant TWITTER, LinkedIN @westonhecker Rapid7 www.rapid7.com

Upload: hoangkhanh

Post on 01-May-2018

223 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: HACKING HOTEL KEYS - DEF CON CON 24/DEF CON 24 presentations/DEF… · HACKING HOTEL KEYS Security Consultant ... Researcher. 9About 11 years pen-testing, Security Research, ... 912

And Point of Sale Systems

HACKING HOTEL KEYS

Security ConsultantTWITTER, LinkedIN @westonheckerRapid7 www.rapid7.com

Page 2: HACKING HOTEL KEYS - DEF CON CON 24/DEF CON 24 presentations/DEF… · HACKING HOTEL KEYS Security Consultant ... Researcher. 9About 11 years pen-testing, Security Research, ... 912

9 Senior Security Engineer/Senior Pentester/ Security Researcher.

9 About 11 years pen-testing, Security Research, Speaker at Defcon 22, 23 and 24 Las Vegas, HOPE 11, TakedownCON 2016,B-sides Boston, Blackhat 2016, Enterprise Connect 2016, ISC2, SC Congress Toronto.

9 12 years programming and Reverse Engineering.9 Side projects Department of Home Land Security.

Attacking 911 centers / Malware Analysis Ransomware. Hacking ATM’s, Cars, Point of Sale Systems, Hotel Key Systems - Property Management Software.

“A Little Bit About Myself”

Page 3: HACKING HOTEL KEYS - DEF CON CON 24/DEF CON 24 presentations/DEF… · HACKING HOTEL KEYS Security Consultant ... Researcher. 9About 11 years pen-testing, Security Research, ... 912

9 Explain magstrip readers Magspoofer. Difference from RFID

9 Explain Modification to device.9Hotel back ends explained, POS systems

Explained9 Process of key checkout check in. Different

parts of hotels.9 Attacks on Privileged Keys. Maids, Service ,

Fireman9 Encryption is just encoded.

What Is This Talk About?

Page 4: HACKING HOTEL KEYS - DEF CON CON 24/DEF CON 24 presentations/DEF… · HACKING HOTEL KEYS Security Consultant ... Researcher. 9About 11 years pen-testing, Security Research, ... 912

9 What lead to research on POS from hotel keys.9 How Do POS systems use magstripe readers.9 Trigger events and when the Reader listening and what

is it listening for.9 Management cards on POS/card readers on the screen.9 How is a magstripe reader Used as a HID keyboard?.9 Injecting 102-US and proprietary keyboard layouts into

binary data.9 Cash tend/Check tend attack. 9 Attacking OS SQL injection CMD Drive by attack9 Restaurant attacks/other mag readers/Rewards

programs and players cards on slot machines

What Is This Talk About?

Page 5: HACKING HOTEL KEYS - DEF CON CON 24/DEF CON 24 presentations/DEF… · HACKING HOTEL KEYS Security Consultant ... Researcher. 9About 11 years pen-testing, Security Research, ... 912

• What is Magspoofer

Thanks to Samy Kamkar for his work.

Page 6: HACKING HOTEL KEYS - DEF CON CON 24/DEF CON 24 presentations/DEF… · HACKING HOTEL KEYS Security Consultant ... Researcher. 9About 11 years pen-testing, Security Research, ... 912

How does a MagstipeReader work

Page 7: HACKING HOTEL KEYS - DEF CON CON 24/DEF CON 24 presentations/DEF… · HACKING HOTEL KEYS Security Consultant ... Researcher. 9About 11 years pen-testing, Security Research, ... 912

• Explanation of Magspoofer+ and EM fields and how they interact with Heads on magnetic head reader this is not RFID Cards!!!.

How magspoofer works what is SMT

Page 8: HACKING HOTEL KEYS - DEF CON CON 24/DEF CON 24 presentations/DEF… · HACKING HOTEL KEYS Security Consultant ... Researcher. 9About 11 years pen-testing, Security Research, ... 912

How To Handle Over Heating

100s of Cards = Heat

Page 9: HACKING HOTEL KEYS - DEF CON CON 24/DEF CON 24 presentations/DEF… · HACKING HOTEL KEYS Security Consultant ... Researcher. 9About 11 years pen-testing, Security Research, ... 912

Explanation of PMS

Page 10: HACKING HOTEL KEYS - DEF CON CON 24/DEF CON 24 presentations/DEF… · HACKING HOTEL KEYS Security Consultant ... Researcher. 9About 11 years pen-testing, Security Research, ... 912

Explanation of proprietary card readers and security behind hotel keys.

Page 11: HACKING HOTEL KEYS - DEF CON CON 24/DEF CON 24 presentations/DEF… · HACKING HOTEL KEYS Security Consultant ... Researcher. 9About 11 years pen-testing, Security Research, ... 912

Collecting information from keys and reissued keys.

Page 12: HACKING HOTEL KEYS - DEF CON CON 24/DEF CON 24 presentations/DEF… · HACKING HOTEL KEYS Security Consultant ... Researcher. 9About 11 years pen-testing, Security Research, ... 912

Interactions with different readers your door vs elevator external access and pool access.

Page 13: HACKING HOTEL KEYS - DEF CON CON 24/DEF CON 24 presentations/DEF… · HACKING HOTEL KEYS Security Consultant ... Researcher. 9About 11 years pen-testing, Security Research, ... 912

Privileged cards Management, Maids, Service, Fireman law enforcement.

Page 14: HACKING HOTEL KEYS - DEF CON CON 24/DEF CON 24 presentations/DEF… · HACKING HOTEL KEYS Security Consultant ... Researcher. 9About 11 years pen-testing, Security Research, ... 912

Examples of card Dumps Raw data from track 3 other tracks restaurant and Resort functions.

There are limitations on charactersyou can enter

Page 15: HACKING HOTEL KEYS - DEF CON CON 24/DEF CON 24 presentations/DEF… · HACKING HOTEL KEYS Security Consultant ... Researcher. 9About 11 years pen-testing, Security Research, ... 912

Breaking the complex encryption of hotel keys... o it’s simple encoding never mind.

Page 16: HACKING HOTEL KEYS - DEF CON CON 24/DEF CON 24 presentations/DEF… · HACKING HOTEL KEYS Security Consultant ... Researcher. 9About 11 years pen-testing, Security Research, ... 912

Checking into your own hotel room KIOSK research.

Page 17: HACKING HOTEL KEYS - DEF CON CON 24/DEF CON 24 presentations/DEF… · HACKING HOTEL KEYS Security Consultant ... Researcher. 9About 11 years pen-testing, Security Research, ... 912

• What lead to this research after • hotel keys?

Point of Sale Systems

Page 18: HACKING HOTEL KEYS - DEF CON CON 24/DEF CON 24 presentations/DEF… · HACKING HOTEL KEYS Security Consultant ... Researcher. 9About 11 years pen-testing, Security Research, ... 912

How do POS systems use magstripereaders?

Page 19: HACKING HOTEL KEYS - DEF CON CON 24/DEF CON 24 presentations/DEF… · HACKING HOTEL KEYS Security Consultant ... Researcher. 9About 11 years pen-testing, Security Research, ... 912

Trigger events and when the Reader listening and what is it listening for.

Page 20: HACKING HOTEL KEYS - DEF CON CON 24/DEF CON 24 presentations/DEF… · HACKING HOTEL KEYS Security Consultant ... Researcher. 9About 11 years pen-testing, Security Research, ... 912

• Management cards on • POS/card readers on the screen.

Page 21: HACKING HOTEL KEYS - DEF CON CON 24/DEF CON 24 presentations/DEF… · HACKING HOTEL KEYS Security Consultant ... Researcher. 9About 11 years pen-testing, Security Research, ... 912

How is a magstripe reader Used as a HID keyboard?

Page 22: HACKING HOTEL KEYS - DEF CON CON 24/DEF CON 24 presentations/DEF… · HACKING HOTEL KEYS Security Consultant ... Researcher. 9About 11 years pen-testing, Security Research, ... 912

Injecting 102-US and proprietary keyboard layouts into binary data.

Page 23: HACKING HOTEL KEYS - DEF CON CON 24/DEF CON 24 presentations/DEF… · HACKING HOTEL KEYS Security Consultant ... Researcher. 9About 11 years pen-testing, Security Research, ... 912

Cash tend/Check tend attack.

Page 24: HACKING HOTEL KEYS - DEF CON CON 24/DEF CON 24 presentations/DEF… · HACKING HOTEL KEYS Security Consultant ... Researcher. 9About 11 years pen-testing, Security Research, ... 912

Behind every strong man is a strong woman and behind ever POS there is a outdated OS.

Page 25: HACKING HOTEL KEYS - DEF CON CON 24/DEF CON 24 presentations/DEF… · HACKING HOTEL KEYS Security Consultant ... Researcher. 9About 11 years pen-testing, Security Research, ... 912

Exiting POS Software.

Page 26: HACKING HOTEL KEYS - DEF CON CON 24/DEF CON 24 presentations/DEF… · HACKING HOTEL KEYS Security Consultant ... Researcher. 9About 11 years pen-testing, Security Research, ... 912

Popping CMD downloading payload.

Page 27: HACKING HOTEL KEYS - DEF CON CON 24/DEF CON 24 presentations/DEF… · HACKING HOTEL KEYS Security Consultant ... Researcher. 9About 11 years pen-testing, Security Research, ... 912

Payload overview what the bad guys would load.

Page 28: HACKING HOTEL KEYS - DEF CON CON 24/DEF CON 24 presentations/DEF… · HACKING HOTEL KEYS Security Consultant ... Researcher. 9About 11 years pen-testing, Security Research, ... 912

Locked down and custom Dev'ed environments.

Page 29: HACKING HOTEL KEYS - DEF CON CON 24/DEF CON 24 presentations/DEF… · HACKING HOTEL KEYS Security Consultant ... Researcher. 9About 11 years pen-testing, Security Research, ... 912

Limitations of mag injection/making a physical card attack/ limitations of physical can you make a waiter do your dirty work?

Page 30: HACKING HOTEL KEYS - DEF CON CON 24/DEF CON 24 presentations/DEF… · HACKING HOTEL KEYS Security Consultant ... Researcher. 9About 11 years pen-testing, Security Research, ... 912

These devicesAre everywhere

Page 31: HACKING HOTEL KEYS - DEF CON CON 24/DEF CON 24 presentations/DEF… · HACKING HOTEL KEYS Security Consultant ... Researcher. 9About 11 years pen-testing, Security Research, ... 912

Injecting player rewards cards into Slot machinespeople already intentionally leave cards in machine for this purpose.

Page 32: HACKING HOTEL KEYS - DEF CON CON 24/DEF CON 24 presentations/DEF… · HACKING HOTEL KEYS Security Consultant ... Researcher. 9About 11 years pen-testing, Security Research, ... 912

Rewards card point collecting rolling 10 different accounts/ Grocery store and gas stations

Page 33: HACKING HOTEL KEYS - DEF CON CON 24/DEF CON 24 presentations/DEF… · HACKING HOTEL KEYS Security Consultant ... Researcher. 9About 11 years pen-testing, Security Research, ... 912

Injecting into prepaid/phone card activation/ activate at terminal swapping systems at POS

Page 34: HACKING HOTEL KEYS - DEF CON CON 24/DEF CON 24 presentations/DEF… · HACKING HOTEL KEYS Security Consultant ... Researcher. 9About 11 years pen-testing, Security Research, ... 912

Trigger injection attacks "Sniffing USB reader” power up when power up is detected it triggers the EM read. Some companies ask to confirm account if only you could hit the enter key some how !!

Page 35: HACKING HOTEL KEYS - DEF CON CON 24/DEF CON 24 presentations/DEF… · HACKING HOTEL KEYS Security Consultant ... Researcher. 9About 11 years pen-testing, Security Research, ... 912

Clock-In systems never be late for work again.

Page 36: HACKING HOTEL KEYS - DEF CON CON 24/DEF CON 24 presentations/DEF… · HACKING HOTEL KEYS Security Consultant ... Researcher. 9About 11 years pen-testing, Security Research, ... 912

• Going to inject the Cash Tender

• And next I'm going to Install Credit Card Skimming Software with a Spoofer.

Going over 2 Demos

Page 37: HACKING HOTEL KEYS - DEF CON CON 24/DEF CON 24 presentations/DEF… · HACKING HOTEL KEYS Security Consultant ... Researcher. 9About 11 years pen-testing, Security Research, ... 912

Stay Legal

THANKS FOR COMING

Security ConsultantTWITTER, LinkedIN @westonheckerRapid7 www.rapid7.com