Tuesday 1 March 2016

ATM theft.

ATM machine.
Turns security defense system ATM machine is not as strong as many expected a layman, the evidence only with a capital flash disk just an ATM can be ordered to pull out all the money, this is what was discussed by A former hacker who is now a security consultant, Barnaby Jack, revealing a new way breaking into the automatic teller machine (ATM).

Jack who is now a director of research at security consulting firm, IOActive Labs, ATM skimming techniques showcased in the annual meeting of hackers, Black Hat in Las Vegas ,.

"I wish I could change the way people perceive the device (ATM), which from the outside looks impenetrable," said Jack in front of an audience before demonstrating how to break into the ATM. To be able to break into the ATM, Jack reported spending more than a year to learn to undermine and break into an ATM machine that is often found in gas stations, bars and retail establishments.

As quoted by REUTERS, yesterday, Demi knows the ins and outs of ATM, Jack to buy their own ATM machine via the internet. At the annual Black Hat conference, Jack showed how he uploaded homemade software called Dillinger.

Former hacker Barnaby Jack presented the only way to break into an ATM machine with a flash disk in the hacker world conference Black Hat

After infecting the ATM machine, software Dillinger will approach and instruct the machine to start issuing cash. Dillinger name refers to the figure of the legendary American robber, John Dillinger. While the software for the ATM artificial Tranax Technologies.

Jack used a key available on the internet to open the protected Triton ATM System. Then, by inserting Dillinger flask disk containing the software into a USB slot, it will force the ATM spew all cash in it. ATM burglarized Jack uses Windows CE device, a version of Microsoft Corp.'s operating system that is widely used on a dedicated computer, including ATM.

Jack said, the actual ATM maker for creating software that can prevent hackers from repeating the same pattern of attack, as he did on the stage at that time. But Jack also confirmed that ATM is still vulnerable to hacker attacks. "I'm not naive enough to declare that I am the only person who could do this," he said.

He added that he believes the ATM used by financial institutions are also vulnerable to attack hackers. But he could not simulate the attack because he was not able to get the ATM of any bank.

While Triton deputy technical director, Bob Douglas, said he was not aware of any successful attacks carried out on the device that created the company.

Some 6,000 hackers and security professionals this week attending the Black Hat conference to discuss vulnerabilities in everything, ranging from software using a PC, mobile phone, up to systems that control power grids.

Many organizers promote such research in a bid to publicize weaknesses of devices for users, so that they can protect themselves and encourage software makers, manufacturers and others to find ways to fix these vulnerabilities.

A science is basically like a knife, can double, for good or bad depending on where the master had knowledge resides, would be utilized to be.
Thank you for reading this article. Written and posted by Bambang Sunarno. sunarnobambang86@gmail.com
author:
https://plus.google.com/105319704331231770941.
name: Bambang Sunarno.
http://primadonablog.blogspot.com/2016/03/atm-theft.html
DatePublished: March 1, 2016 at 08:38
Tag : ATM theft.
Code : 7MHPNPADAEFW

Posted by: Bambang Sunarno
www.Primo.com Updated at: 08:38

No comments:

Post a Comment