Completed
Scenario
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
For the Love of Money - Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Point of Sale terminals
- 3 Bar in 44CON
- 4 Mobile pointofsale terminals
- 5 Previous research
- 6 Project overview
- 7 Security assessment
- 8 How payments work
- 9 Payment aggregators
- 10 Payment methods
- 11 EMV adoption
- 12 Schematic overview
- 13 Findings
- 14 Bluetooth
- 15 Bluetooth Protocol
- 16 Bluetooth Classic
- 17 Bluetooth Device Address
- 18 Bluetooth Attack Vectors
- 19 Maninthemiddle attacks
- 20 Enhanced data rates
- 21 Sending arbitrary commands
- 22 Prerequisites
- 23 Wireshark
- 24 In practice
- 25 In detail
- 26 What is fuzzing
- 27 The ESP32
- 28 Output
- 29 Sending
- 30 External Devices
- 31 Demo
- 32 Mac Stripe
- 33 Recommendations
- 34 Mobile POS
- 35 Reverse Engineering
- 36 Updating Process
- 37 Open Account
- 38 Un unencrypted firmware
- 39 Remote code execution
- 40 Why its important to have full access
- 41 Two potential problems
- 42 Scenario
- 43 Hardware Protection
- 44 Secondary Factors
- 45 Assessing risk
- 46 Conclusions
- 47 Vendors
- 48 Merchants