¡¶¿¼ÊÔÓëÆÀ¼Û¡·ÔÓ־ȫ²¿²úÆ·¿ªÍ¨ÁËÍøÉ϶©ÔÄ¡£Í¨¹ýаæÍøÕ¾µÄÊéµêÈë¿Ú£¬¼´¿ÉÔÚÏ߶©ÔÄ¡¶¿¼ÊÔÓëÆÀ¼Û¡·ËùÓаæ±ð¡£
±à¼­²¿ÁªÏµµç»°£º
³õÖб༭²¿£º04353940570
¹ã¸æ²¿µç»°£º04353940521
Óʹº²¿µç»°£º04353940797
  ÄúÏÖÔÚµÄλÖ㺠¿¼ÊÔÓëÆÀ¼Û >> ÐÂÎÅÖÐÐÄ >> Ó¢ÓïÐÂÎÅ >> ÕýÎÄ
ºÚ¿ÍÁîATM»ú×Ô¶¯Í³®
maisie  ÎÄÕÂÀ´Ô´£º±¾Õ¾Ô­´´  µã»÷Êý£º

 [ÎÄÕ°æȨ ½ûֹתÔØ:¿¼ÊÔÓëÆÀ¼Û }Y0juF3!3~R 6E+VFroG]

ºÚ¿ÍÁîATM»ú×Ô¶¯Í³®[ÎÄÕÂÀ´×Ô:¿¼ÊÔÓëÆÀ¼Û ? )?^c=)O0O)0]
Hacker ATM attacks show security holes
[ÎÄÕ°æȨ ½ûֹתÔØ:¿¼ÊÔÓëÆÀ¼Û €&T"g._);3;n&b}XyFroG]

[ÎÄÕ°æȨ ½ûֹתÔØ:¿¼ÊÔÓëÆÀ¼Û ]Swwty8M@ j%D+FroG]

[ÎÄÕ°æȨ ½ûֹתÔØ:¿¼ÊÔÓëÆÀ¼Û ZT Eq:!Q)!(@+&{@_FroG]

ÉÏÖÜ£¬ÔÚÃÀ¹úÀ­Ë¹Î¤¼Ó˹¾ÙÐеĵçÄÔ°²È«×¨Òµ´ó»á¡°ºÚñ´ó»á¡±ÉÏ£¬Ò»Î»¼ÆËã»úºÚ¿ÍÏò¹ÛÖÚչʾÁ˲»ÓÃÒøÐп¨¾ÍÄÜÈÃATM»ú·è¿ñͳ®µÄ¡°¾ø¼¼¡±£¬ÈÃÏÖ³¡¹ÛÖÚ¿´µÃÄ¿µÉ¿Ú´ô¡£ÕâλºÚ¿ÍÃû½Ð½Ü¿Ë£¬ÆäʵÊÇһλ×ÊÉîµÄ¼ÆËã»ú°²È«Ñо¿ÈËÔ±£¬Ëû»¨ÁËÁ½ÄêµÄʱ¼äÑо¿¸÷ÖÖ¶ÀÁ¢ATM»ú£¬²¢ÕÒµ½ÁËÕâЩÉ豸µÄ©¶´¡£Ëû·¢ÏÖͬһ³§ÉÌÖÆÔìµÄͬһÐͺÅATM»úʹÓõÄÔ¿³×¶¼ÊÇÒ»ÑùµÄ£¬ËûÔÚչʾʱÓÃÔ¿³×´ò¿ªÒ»Ì¨ATMÀﺬÓбê×¼USB×°ÖõIJ¿¼þ£¬²åÈëËû×Ô¼ºÐ´µÄÆƽâ³ÌÐò£¬È»ºó˳Àû²Ù¿ØATMµçÄÔ£¬ÈûúÆ÷×Ô¼ºÍ³ö³®Æ±¡£½Ü¿ËչʾµÄÁíÒ»ÖÖ¹¥»÷·½Ê½Ôò¸ü¾ßÍþвÐÔ£¬ËûÊÇͨ¹ýÍøÂç¶ÔATMϵͳ½øÐÐÔ¶³Ì²Ù¿Ø£¬ÀûÓÃATM³§ÉÌÓëATM»úÍøÂçÁ¬½ÓÖеÄ©¶´ÈëÇÖATM»úµÄµçÄÔϵͳ£¬²»ÓÃÈκÎÃÜÂë±ãÄÜ×ÔÈç²Ù¿ØATM»ú¡£½Ü¿ËÔÚ»áÉÏûÓÐÉîÈë˵Ã÷ÈëÇÖATM·½·¨µÄ¾ßÌå²Ù×÷ϸ½Ú£¬ÒÔ¼°Éæ¼°µÄATM³§ÉÌ¡£ËûÇ¿µ÷£¬Ëû¡°²»ÊÇÔڽ̴ó¼ÒÆƽâATM»ú ¡±£¬¶øÊÇÒªÈÃATM³§ÉÌÌá¸ß¾¯¾õ¡£

[ÎÄÕ°æȨ ½ûֹתÔØ:¿¼ÊÔÓëÆÀ¼Û [$[6;#`HKG-^chpoFroG]

A hacker has discovered a way to force ATMs to disgorge their cash by hijacking the computers inside them.

[ÎÄÕ°æȨ ½ûֹתÔØ:¿¼ÊÔÓëÆÀ¼Û Mov?qgP1 |D\.nFroG]

The attacks demonstrated Wednesday targeted standalone ATMs. But they could potentially be used against the ATMs operated by mainstream banks.

[ÎÄÕ°æȨ ½ûֹתÔØ:¿¼ÊÔÓëÆÀ¼Û 59\;ZP JDiY(;ziNFroG]

Computer hacker Barnaby Jack spent two years tinkering in his Silicon Valley apartment with ATMs he bought online. These were standalone machines, the type seen in front of convenience stores, rather than the ones in bank branches.

[ÎÄÕ°æȨ ½ûֹתÔØ:¿¼ÊÔÓëÆÀ¼Û `_]/)b\; JEVOv1&\/FroG]

His goal was to find ways to take control of ATMs by exploiting weaknesses in the computers that run the machines.

[ÎÄÕ°æȨ ½ûֹתÔØ:¿¼ÊÔÓëÆÀ¼Û 09Ov`@F|zoFFroG]

He showed off his results here at the Black Hat conference, an annual gathering devoted to exposing the latest computer-security vulnerabilities.

[ÎÄÕ°æȨ ½ûֹתÔØ:¿¼ÊÔÓëÆÀ¼Û 0dl?{D)y-=wt]vgFroG]

His attacks have wide implications because they affect multiple types of ATMs and exploit weaknesses in software and security measures that are used throughout the industry.

[ÎÄÕ°æȨ ½ûֹתÔØ:¿¼ÊÔÓëÆÀ¼Û 9J\[;= T/ ( Q0FroG]

Jack, who works as director of security research for Seattle-based IOActive Inc, showed in a theatrical demonstration two ways he can get ATMs to spit out money:

[ÎÄÕ°æȨ ½ûֹתÔØ:¿¼ÊÔÓëÆÀ¼Û l'C@)G}ebC/vZ{Frv4SFroG]

- He found that the physical keys that came with his machines were the same for all ATMs of that type made by that manufacturer. He figured this out by ordering three ATMs from different manufacturers for a few thousand dollars each. Then he compared the keys he got to pictures of other keys, found on the internet.

[ÎÄÕ°æȨ ½ûֹתÔØ:¿¼ÊÔÓëÆÀ¼Û @\oNe;nr;P,+o|FroG]

He used his key to unlock a compartment in the ATM that had standard USB slots. He inserted a program he had written into one of them, commanding the ATM to dump its vaults.

[ÎÄÕ°æȨ ½ûֹתÔØ:¿¼ÊÔÓëÆÀ¼Û PM -8qu5z%`sf~/kFroG]

- He hacked into the machines by exploiting weaknesses in the way ATM makers communicate with the machines over the internet. Jack said the problem is that outsiders are permitted to bypass the need for a password. He didn't go into much more detail because he said the goal of his talk "isn't to teach everybody how to hack ATMs. It's to raise the issue and have ATM manufacturers be proactive about implementing fixes."

[ÎÄÕ°æȨ ½ûֹתÔØ:¿¼ÊÔÓëÆÀ¼Û N{ppO46u^HR0\FfdmFroG]

The remote style of attack is more dangerous because an attacker doesn't need to open up the ATMs.

[ÎÄÕ°æȨ ½ûֹתÔØ:¿¼ÊÔÓëÆÀ¼Û U w" )wloX{L'@2~, FroG]

It allows an attacker to gain full control of the ATMs and not only order it to spit out money, but also to silently harvest card data from anyone who uses the machines. It also affects more than just the standalone ATMs vulnerable to the physical attack, and could potentially be used against the kinds of ATMs used by mainstream banks.

[ÎÄÕ°æȨ ½ûֹתÔØ:¿¼ÊÔÓëÆÀ¼Û =w5cwXw8c8: :?FroG]

Jack said he didn't think he'd be able to break the ATMs when he first started probing them.

[ÎÄÕ°æȨ ½ûֹתÔØ:¿¼ÊÔÓëÆÀ¼Û R]+//c[?M036"FroG]

Jack said the manufacturers whose machines he studied are deploying software fixes for both vulnerabilities, but added that the prevalence of remote-management software broadly opens up ATMs to hacker attacks.

[ÎÄÕ°æȨ ½ûֹתÔØ:¿¼ÊÔÓëÆÀ¼Û W+$C]']s"}k;KxNM FroG]

 [ÎÄÕ°æȨ ½ûֹתÔØ:¿¼ÊÔÓëÆÀ¼Û z++)8AN 9xlF *FroG]


ÎÄÕ¼È룺maisie    ÔðÈα༭£ºmaisie 
¡¡¡¡ÍøÓÑÆÀÂÛ£º£¨Äú¿ÉÒÔͨ¹ýÁôÑÔ²ÎÓëÎÒÃǵĻ¡£ÆÀÂÛÄÚÈÝÖ»´ú±íÍøÓѹ۵㣬Óë±¾Õ¾Á¢³¡Î޹أ¡£©
 
  ±¾Õ¾³ÏÕ÷ÓÑÇéÎÄ×ÖÁ´½Ó½»»»£¡ÇëÁªÏµmail£ºready@foxmail.com £» QQ£º13338888  
ÌìÈʱ¨Òµ¼¯ÍÅÍøÕ¾  Ó¢Ó︨µ¼±¨  ¡¶¿¼ÊÔÓëÆÀ¼Û¡·ÔÓÖ¾  ÓïÎÄѧϰ±¨  Êýѧ¸¨µ¼±¨  ËØÖʽÌÓý±¨  IATEFLCHINA  ËÄλһÌå½ÌÓý½ÌѧÍø  
 
 

 

Copyright 2007 - 2015 ¡¶¿¼ÊÔÓëÆÀ¼Û¡·ÔÓÖ¾Éç. All Rights Reserved

 

ÌìÈʱ¨Òµ¼¯ÍÅ °æȨËùÓÐ