Completed
Exploiting payment flows
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Breaking Payment Points of Interaction
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Challenge
- 3 Security through obscurity
- 4 Architecture types
- 5 How payments work
- 6 Exploiting payment flows
- 7 Demo
- 8 Getting EMV Data
- 9 Active Attacks
- 10 Demonstration
- 11 Mitigation
- 12 Pointtopoint Encryption
- 13 PIN Pad Encryption
- 14 Offline
- 15 Encryption
- 16 Authentication
- 17 Consumer Perspective
- 18 Unusual Prompts
- 19 Summary
- 20 Questions