SlideShare ist ein Scribd-Unternehmen logo
1 von 42
Downloaden Sie, um offline zu lesen
PHDays 2012 (May 30 / May 31 / 2012 / Moscow)



                  Credit Cards:
 Guessing CVV, Spoofing Payment and Experiences
          with Fraud Detection Systems

                  Micha Borrmann

                     SySS GmbH


                    May 31, 2012
About my Point of View



     In most cases I run black box tests against systems and
     applications
     I’m employed at a company which is offering professional
     penetration tests exclusively
     My point of view is from the attacking perspective; I do neither
     know the application source code nor detailed network maps
     All descriptions were found in the course of real professional
     penetration tests (with strong NDAs): no company names will be
     published




  M. Borrmann (SySS GmbH)        PHDays 2012                May 31, 2012   2 / 22
First Project



     Long time ago (2007), a popular website ordered a professional
     penetration test
     However, they represented a minority of analyzed sites, as I found
     no SQL injection and only few of the typical issues
     But there was a possibility at the website for account verification,
     which could be used with a valid credit card
     It means, a valid credit card number had to be typed into the web
     site to verify an account




  M. Borrmann (SySS GmbH)        PHDays 2012                May 31, 2012   3 / 22
Using a Credit Card on the Web

     Card Holder Name
     Credit card number
     Expiration date
     Card Security Code (CVV)

Card security code
The card security code (CSC), sometimes called Card Verification
Data (CVD), Card Verification Value (CVV or CVV2), Card Verification
Value Code (CVVC), Card Verification Code (CVC or CVC2),
Verification Code (V-Code or V Code), or Card Code Verification (CCV)
are different terms for security features for credit or debit card
transactions, providing increased protection against credit card fraud.

http://en.wikipedia.org/wiki/Card_security_code

  M. Borrmann (SySS GmbH)       PHDays 2012               May 31, 2012   4 / 22
CVV



Generation of card security codes
CVC1, CVV1, CVC2 and CVV2 values are generated when the card is
issued. The values are calculated by encrypting the bank card number
(also known as the primary account number or PAN), expiration date
and service code with encryption keys (often called Card Verification
Key or CVK) known only to the issuing bank, and decimalising the
result.

http://en.wikipedia.org/wiki/Card_security_code#Generation_
of_card_security_codes




  M. Borrmann (SySS GmbH)     PHDays 2012               May 31, 2012   5 / 22
PCI (Payment Card Industry)




https://www.pcisecuritystandards.org/documents/navigating_dss_v20.pdf

  M. Borrmann (SySS GmbH)       PHDays 2012                May 31, 2012   6 / 22
PCI (Payment Card Industry)




 Sensitive
 authentication
 data must not
 be stored after
 authorization
 (even if
 encrypted).




https://www.pcisecuritystandards.org/documents/navigating_dss_v20.pdf

  M. Borrmann (SySS GmbH)       PHDays 2012                May 31, 2012   6 / 22
Guessing CVV?

Client
     Not our business
     There are a lot of fraud detection systems bank-side and your
     check will fail
     You can check it if you want (yeah!)




  M. Borrmann (SySS GmbH)       PHDays 2012               May 31, 2012   7 / 22
Guessing CVV?

Client
     Not our business
     There are a lot of fraud detection systems bank-side and your
     check will fail
     You can check it if you want (yeah!)

Result (using the MasterCard of my boss)
     A script which can easily be written runs all possible CVV (000 to
     999) for a given credit card number (needs around some hours)




  M. Borrmann (SySS GmbH)       PHDays 2012                May 31, 2012   7 / 22
Guessing CVV?

Client
     Not our business
     There are a lot of fraud detection systems bank-side and your
     check will fail
     You can check it if you want (yeah!)

Result (using the MasterCard of my boss)
     A script which can easily be written runs all possible CVV (000 to
     999) for a given credit card number (needs around some hours)
     999 error messages were received and 1 success message
     The CVV to a given credit card number was successfully guessed
     Where was the fraud prevention system?


  M. Borrmann (SySS GmbH)       PHDays 2012                May 31, 2012   7 / 22
Brave CVV Guessing


    Only expiration date, credit card number and CVV had to be put in
    (no card holder name)
    CVV is not possible to know
    What happens if the expiration date is not known either?




 M. Borrmann (SySS GmbH)      PHDays 2012                May 31, 2012   8 / 22
Brave CVV Guessing


     Only expiration date, credit card number and CVV had to be put in
     (no card holder name)
     CVV is not possible to know
     What happens if the expiration date is not known either?

Check
36 parallel scripts were run (for the next 36 months as expiration date)




  M. Borrmann (SySS GmbH)       PHDays 2012                May 31, 2012   8 / 22
Brave CVV Guessing


     Only expiration date, credit card number and CVV had to be put in
     (no card holder name)
     CVV is not possible to know
     What happens if the expiration date is not known either?

Check
36 parallel scripts were run (for the next 36 months as expiration date)

Result
The issuing bank called my boss as they detected strange activities on
his MasterCard and the card was revoked immediately.
Fraud detection systems do exist!


  M. Borrmann (SySS GmbH)       PHDays 2012                May 31, 2012   8 / 22
Expiration Date

     It is not absolutely neccessary to guess it because it is not tagged
     as secure
     Written on a lot of receipts, sometimes also with the entire credit
     card number




  M. Borrmann (SySS GmbH)        PHDays 2012                 May 31, 2012   9 / 22
Expiration Date

     It is not absolutely neccessary to guess it because it is not tagged
     as secure
     Written on a lot of receipts, sometimes also with the entire credit
     card number




  M. Borrmann (SySS GmbH)        PHDays 2012                 May 31, 2012   9 / 22
Expiration Date

     It is not absolutely neccessary to guess it because it is not tagged
     as secure
     Written on a lot of receipts, sometimes also with the entire credit
     card number




  M. Borrmann (SySS GmbH)        PHDays 2012                 May 31, 2012   9 / 22
The Never Ending Story Starts

     In November 2007 a hack into a big German website was in the
     media
     The website used to sell tickets for self-print out
     The stolen data also included CVV data
     A German TV team asked: What do you know about credit card
     security?
     The answer was: We can guess the CVV of your credit cards
     The TV guys asked for a demonstration
     Used another website (not my customer’s website), as the attack
     was not against a website but against a credit card number
     I had checked my script one day before the appointment with the
     TV guys successfully (with the new credit card of my boss)


  M. Borrmann (SySS GmbH)         PHDays 2012              May 31, 2012   10 / 22
First CVV Guessing in the Media

     The website changed their setup and behaviour on that day, when
     the TV guys were in my office
     More live demonstration than I expected before
     They xeroxed a front side of a VISA and a MasterCard and this
     sheet of paper was given to me




  M. Borrmann (SySS GmbH)      PHDays 2012              May 31, 2012   11 / 22
First CVV Guessing in the Media

     The website changed their setup and behaviour on that day, when
     the TV guys were in my office
     More live demonstration than I expected before
     They xeroxed a front side of a VISA and a MasterCard and this
     sheet of paper was given to me
     Well, after waiting less than two hours, I got the current CVV
     values!
     No fraud detection system could be detected




  M. Borrmann (SySS GmbH)       PHDays 2012                May 31, 2012   11 / 22
First CVV Guessing in the Media

     The website changed their setup and behaviour on that day, when
     the TV guys were in my office
     More live demonstration than I expected before
     They xeroxed a front side of a VISA and a MasterCard and this
     sheet of paper was given to me
     Well, after waiting less than two hours, I got the current CVV
     values!
     No fraud detection system could be detected

Statement from Credit Card Industry
VISA: Additional measurements enforce, that stolen credit card data
are only minimally useable by criminals


  M. Borrmann (SySS GmbH)       PHDays 2012                May 31, 2012   11 / 22
The Story Goes On


    In May 2011 a journalist of the German magazine DIE ZEIT was
    investigating about insecurity and he detected the formerly
    published attack of CVV guessing.
    He asked me, is it still possible?
    Well, let’s try!
    I also got two credit card data (credit card number and expiration
    date): 1 MasterCard and 1 VISA (both represent more than 90%
    of the market in Germany)
    It was not possible for me to simple increase the numbers for the
    CVV as there was an automatic fraud detection system. Wow!




 M. Borrmann (SySS GmbH)        PHDays 2012               May 31, 2012   12 / 22
Analyzing the Detected Anti Fraud System



     After 3 invalid CVV within 15 minutes a message came back
     indicating that such a solution seems to be active:
     Payment declined by AFDS (AFDS-HFC)
     AFDS sounds like Automatic Fraud Detection System, isn’t?!
     You can wait for 15 minutes after 3 invalid attempts, but it takes
     too much time
     Need for speed?
     Change the source IP number!
     It can be scripted with open proxies, Tor Project ...




  M. Borrmann (SySS GmbH)        PHDays 2012                 May 31, 2012   13 / 22
Strange Results



Result
4 years after the first public demonstration, an automatic fraud
detection system simply to be bypassed was detected




  M. Borrmann (SySS GmbH)       PHDays 2012               May 31, 2012   14 / 22
Strange Results



Result
4 years after the first public demonstration, an automatic fraud
detection system simply to be bypassed was detected

VISA
Two valid useable CVV for the given VISA card were detected. One
was printed on the backside the other one is an additional value.
Maybe, there is a collision attack within the generating algorithm.




  M. Borrmann (SySS GmbH)       PHDays 2012               May 31, 2012   14 / 22
Entertainment

     The article in the magazine DIE ZEIT was read by a radio
     journalist
     He did not believe that this was a true story (in summer 2011)
     He interviewed me for a radio station and he sent me two credit
     card numbers and the expiration dates via text message (but of
     course, no CVV and no cardholders name)
     I used the name “Joe Smith” as cardholder’s name but you can
     expect the result




  M. Borrmann (SySS GmbH)       PHDays 2012               May 31, 2012   15 / 22
Entertainment

     The article in the magazine DIE ZEIT was read by a radio
     journalist
     He did not believe that this was a true story (in summer 2011)
     He interviewed me for a radio station and he sent me two credit
     card numbers and the expiration dates via text message (but of
     course, no CVV and no cardholders name)
     I used the name “Joe Smith” as cardholder’s name but you can
     expect the result
     I successfully detected the CVV
     This radio interview was also heared by Ukrainian people
     There was another interview and the first non-German notice
     about it: http://www.dw.de/dw/article/0,,15295808,00.html


  M. Borrmann (SySS GmbH)       PHDays 2012               May 31, 2012   15 / 22
Bypassing Credit Card Payment, First Minds


     Do you remember the first little film with the increasing numbers
     on my laptop screen?
     The numbers on the screen were mostly for the TV guys
     However, during the time the cameraman was behind me, I
     detected a strange behaviour:
           an invalid CVV was responded with a redirect to
           https://webshop.com/error.php
           but the valid CVV was responded with a redirect to
           https://webshop.com/success.php

Big question
What happens if I go to https://webshop.com/success.php directly?



  M. Borrmann (SySS GmbH)          PHDays 2012                  May 31, 2012   16 / 22
Using a Payment Provider




     These providers are popular because the web shops do not store
     credit card data and do not need a PCI certificate
     How does the communication between the web shop and the
     payment provider work?
           directly
           via the browser of the user (this is useful for manipulations, yeah)




  M. Borrmann (SySS GmbH)           PHDays 2012                   May 31, 2012   17 / 22
Using a Payment Provider (via the User’s Browser)




webshop.com                                paymentprovider.com




                             user
   M. Borrmann (SySS GmbH)   PHDays 2012         May 31, 2012   18 / 22
Using a Payment Provider (via the User’s Browser)




webshop.com                                                  paymentprovider.com
    ifr
       am
          e
            at
               pa
                 ym
                     en
                        tp
                          ro
                               vi
                                 de
                                    r.
                                         co
                                           m



                                               user
     M. Borrmann (SySS GmbH)                   PHDays 2012         May 31, 2012   18 / 22
Using a Payment Provider (via the User’s Browser)




webshop.com                                                                  paymentprovider.com
    ifr                                                                                                  )
       am                                                                                             VV
          e                                                                                         C
            at                                                                                    g
               pa                                                                            d in
                 ym                                                                      clu
                     en                                                             ( in
                        tp                                                        a
                          ro
                                                                             D at
                               vi
                                 de                                    ard
                                    r.                              tC
                                         co
                                           m                    edi
                                                             Cr


                                               user
     M. Borrmann (SySS GmbH)                   PHDays 2012                             May 31, 2012   18 / 22
Using a Payment Provider (via the User’s Browser)




webshop.com                                                                     paymentprovider.com
    ifr                                                                                    hp               )
       am                                                                        2 ror.p                 VV
          e                                                                   3 0 r                    C
            at                                                              e /e                     g
               pa                                                       C od com                d in
                 ym                                                  P op.                  clu
                     en                                          TT sh
                                                              H eb                     ( in
                        tp                                                           a
                          ro                                 s ://
                                                                   w
                                                                                D at
                               vi                          tp                 d
                                 de                     ht                 ar
                                    r.                                   C
                                         co                           it
                                           m                       ed
                                                              Cr


                                               user
     M. Borrmann (SySS GmbH)                   PHDays 2012                            May 31, 2012     18 / 22
Using a Payment Provider (via the User’s Browser)




webshop.comht                                                                            paymentprovider.com
    ifr           tp
       am            s:                                                                             hp               )
          e
                        //w
                           eb                                                             2 ror.p
                                                                                         0 r                    C VV
                                                                                       3
            at                sh                                                     e /e                     g
               pa                op
                                   .c                                            C od com                d in
                 ym                   om                                      P op.                  clu
                     en                  /s                               TT sh
                                                                       H eb                     ( in
                          tp                uc
                                                                                              a
                             ro                ce
                                                  ss                  s ://
                                                                            w
                                                                                         D at
                                vi                  .p              tp                 d
                                   de                  hp        ht                 ar
                                       r.                                         C
                                          co                                   it
                                             m                              ed
                                                                       Cr


                                                        user
       M. Borrmann (SySS GmbH)                          PHDays 2012                            May 31, 2012     18 / 22
Using a Payment Provider (via the User’s Browser)

                           Result
                         If you get a message like “thank
                         you for your order” than it
                         seems that your payment was
webshop.comht                                                                    paymentprovider.com
    ifr           tp successfully spoofed
       am           s:                                                                      hp               )
          e
                       //w
                          eb                                                      2 ror.p
                                                                                 0 r                    C VV
                                                                               3
            at               sh                                              e /e                     g
               pa               op
                                  .c                                     C od com                d in
                 ym                  om                               P op.                  clu
                    en                  /s                        TT sh
                                                               H eb                     ( in
                         tp                uc
                                                                                      a
                            ro                ce
                                                 ss           s ://
                                                                    w
                                                                                 D at
                               vi                  .p       tp                 d
                                  de                  hp ht                 ar
                                      r.                                  C
                                         co                            it
                                            m                       ed
                                                               Cr


                                                   user
      M. Borrmann (SySS GmbH)                     PHDays 2012                            May 31, 2012   18 / 22
Successfully Bypassing Credit Card Payment

     Successfully tested against a friendly shop in January 2008
     On some payment providers, the web shop can enable an optional
     (!!!) security feature: a hash is calculated over a string which
     includes a password and the total to be paid and this hash is
     additionally transferred




  M. Borrmann (SySS GmbH)      PHDays 2012               May 31, 2012   19 / 22
Successfully Bypassing Credit Card Payment

     Successfully tested against a friendly shop in January 2008
     On some payment providers, the web shop can enable an optional
     (!!!) security feature: a hash is calculated over a string which
     includes a password and the total to be paid and this hash is
     additionally transferred
     Has anybody ever heard of a replay attack?
     An article for a German computer magazine (c’t) was held back
     until the trade fair CeBIT 2008
     This kind of attack was described and presented at the CeBIT
     (March 2008)




  M. Borrmann (SySS GmbH)      PHDays 2012               May 31, 2012   19 / 22
Successfully Bypassing Credit Card Payment

     Successfully tested against a friendly shop in January 2008
     On some payment providers, the web shop can enable an optional
     (!!!) security feature: a hash is calculated over a string which
     includes a password and the total to be paid and this hash is
     additionally transferred
     Has anybody ever heard of a replay attack?
     An article for a German computer magazine (c’t) was held back
     until the trade fair CeBIT 2008
     This kind of attack was described and presented at the CeBIT
     (March 2008)
     In summer 2008 I was penetration testing a foreign web shop
     It was possible for me to successfully spoof a valid credit card
     payment for the first time; the box with the product was shipped to
     Germany

  M. Borrmann (SySS GmbH)       PHDays 2012               May 31, 2012   19 / 22
Other topics with payment providers


     Parameter fraud_detection=yes
     Not only related to payment with credit cards
     Thibault Koechlin from NBS System talked about Naxsi
     (http://code.google.com/p/naxsi/) this morning
     NBS System has written an advisory for a similar attack:
     http://www.nbs-system.co.uk/blog-2/security/
     magento-paypal-vulnerability.html




  M. Borrmann (SySS GmbH)       PHDays 2012               May 31, 2012   20 / 22
Other topics with payment providers


     Parameter fraud_detection=yes
     Not only related to payment with credit cards
     Thibault Koechlin from NBS System talked about Naxsi
     (http://code.google.com/p/naxsi/) this morning
     NBS System has written an advisory for a similar attack:
     http://www.nbs-system.co.uk/blog-2/security/
     magento-paypal-vulnerability.html

Attention
This kind of bypassing payment is not only related to credit card
payment (see advisory related to Paypal) and can not be secured with a
web application firewall



  M. Borrmann (SySS GmbH)       PHDays 2012               May 31, 2012   20 / 22
Summary and Hints



    Be careful with credit card receipts
    Check your credit card balance
    Do not expect fraud detection systems for CVV guessing
    Do not trust automatic fraud detection systems for CVV guessing




 M. Borrmann (SySS GmbH)        PHDays 2012            May 31, 2012   21 / 22
Summary and Hints



    Be careful with credit card receipts
    Check your credit card balance
    Do not expect fraud detection systems for CVV guessing
    Do not trust automatic fraud detection systems for CVV guessing
    Do not call CVV a security feature
    Do not expect IT security awareness from your payment provider if
    you are in charge for a web shop
    Do not trust data from the web shops if you are a payment provider
    Think about the unthought issues if you are a web programmer




 M. Borrmann (SySS GmbH)        PHDays 2012             May 31, 2012   21 / 22
E-Mail




     micha.borrmann@syss.de
     PGP fingerprint:
     6897 7B33 B359 B8BA 0884 969F FC67 EBA9 1B51 128A




  M. Borrmann (SySS GmbH)     PHDays 2012        May 31, 2012   22 / 22

Weitere ähnliche Inhalte

Was ist angesagt?

Digital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksDigital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksEvernym
 
Electronic Payment Systems Shortened
Electronic Payment Systems ShortenedElectronic Payment Systems Shortened
Electronic Payment Systems ShortenedRitesh Verma
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-CommerceHem Pokhrel
 
Electronic payment system
Electronic payment systemElectronic payment system
Electronic payment systempankhadi
 
Verifiable Credentials in Self-Sovereign Identity (SSI)
Verifiable Credentials in Self-Sovereign Identity (SSI)Verifiable Credentials in Self-Sovereign Identity (SSI)
Verifiable Credentials in Self-Sovereign Identity (SSI)Evernym
 
Client server security threats
Client server security threatsClient server security threats
Client server security threatsrahul kundu
 
OpenID for Verifiable Credentials (IIW 35)
OpenID for Verifiable Credentials (IIW 35)OpenID for Verifiable Credentials (IIW 35)
OpenID for Verifiable Credentials (IIW 35)Torsten Lodderstedt
 
Introduction to EDI Basics
Introduction to EDI BasicsIntroduction to EDI Basics
Introduction to EDI BasicsGXS
 
Python在豆瓣的应用
Python在豆瓣的应用Python在豆瓣的应用
Python在豆瓣的应用Qiangning Hong
 
cloud computing in e commerce
cloud computing in e commercecloud computing in e commerce
cloud computing in e commercesteffz
 
Electronic Payment System
Electronic Payment SystemElectronic Payment System
Electronic Payment SystemRitesh Goyal
 
E commerce presentation
E commerce presentationE commerce presentation
E commerce presentationMahnoor Sohail
 
How Payment Cards Really Work?
How Payment Cards Really Work?How Payment Cards Really Work?
How Payment Cards Really Work?Dmitry Buzdin
 
Introduction to Self Sovereign Identity
Introduction to Self Sovereign IdentityIntroduction to Self Sovereign Identity
Introduction to Self Sovereign IdentityHeather Vescent
 

Was ist angesagt? (20)

Digital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksDigital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For Banks
 
Verifiable credentials explained by CCI
Verifiable credentials explained by CCIVerifiable credentials explained by CCI
Verifiable credentials explained by CCI
 
Electronic Payment Systems Shortened
Electronic Payment Systems ShortenedElectronic Payment Systems Shortened
Electronic Payment Systems Shortened
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-Commerce
 
Mobile payment
Mobile paymentMobile payment
Mobile payment
 
Electronic payment system
Electronic payment systemElectronic payment system
Electronic payment system
 
Verifiable Credentials in Self-Sovereign Identity (SSI)
Verifiable Credentials in Self-Sovereign Identity (SSI)Verifiable Credentials in Self-Sovereign Identity (SSI)
Verifiable Credentials in Self-Sovereign Identity (SSI)
 
Client server security threats
Client server security threatsClient server security threats
Client server security threats
 
E commerce
E commerceE commerce
E commerce
 
OpenID for Verifiable Credentials (IIW 35)
OpenID for Verifiable Credentials (IIW 35)OpenID for Verifiable Credentials (IIW 35)
OpenID for Verifiable Credentials (IIW 35)
 
E payment
E paymentE payment
E payment
 
Introduction to EDI Basics
Introduction to EDI BasicsIntroduction to EDI Basics
Introduction to EDI Basics
 
Python在豆瓣的应用
Python在豆瓣的应用Python在豆瓣的应用
Python在豆瓣的应用
 
cloud computing in e commerce
cloud computing in e commercecloud computing in e commerce
cloud computing in e commerce
 
Electronic Payment System
Electronic Payment SystemElectronic Payment System
Electronic Payment System
 
E commerce presentation
E commerce presentationE commerce presentation
E commerce presentation
 
e-commerce
e-commercee-commerce
e-commerce
 
How Payment Cards Really Work?
How Payment Cards Really Work?How Payment Cards Really Work?
How Payment Cards Really Work?
 
E payment methodss
E payment methodssE payment methodss
E payment methodss
 
Introduction to Self Sovereign Identity
Introduction to Self Sovereign IdentityIntroduction to Self Sovereign Identity
Introduction to Self Sovereign Identity
 

Andere mochten auch

Documents About [Credit Card]
Documents About [Credit Card]Documents About [Credit Card]
Documents About [Credit Card]abaraham mores
 
OpenCard hack (projekt chameleon)
OpenCard hack (projekt chameleon)OpenCard hack (projekt chameleon)
OpenCard hack (projekt chameleon)Tech4 Helper
 
Luhn algorithm
Luhn algorithmLuhn algorithm
Luhn algorithmNguyen Huy
 
So you want to be an EMV Issuer...
So you want to be an EMV Issuer...So you want to be an EMV Issuer...
So you want to be an EMV Issuer...Ainsley Ward
 
Payer Authentication Solutions For Verified by VISA
Payer Authentication Solutions For Verified by VISAPayer Authentication Solutions For Verified by VISA
Payer Authentication Solutions For Verified by VISAFirst Atlantic Commerce
 
Pine Labs Loyalty Solution - Nova
Pine Labs Loyalty Solution - NovaPine Labs Loyalty Solution - Nova
Pine Labs Loyalty Solution - Novasingularityin
 
Black Hat 2011 - Pulp Google Hacking: The Next Generation Search Engine Hacki...
Black Hat 2011 - Pulp Google Hacking: The Next Generation Search Engine Hacki...Black Hat 2011 - Pulp Google Hacking: The Next Generation Search Engine Hacki...
Black Hat 2011 - Pulp Google Hacking: The Next Generation Search Engine Hacki...Rob Ragan
 
Hacking Smartcards & RFID
Hacking Smartcards & RFIDHacking Smartcards & RFID
Hacking Smartcards & RFIDDevnology
 
A Survey of Online Credit Card Fraud Detection using Data Mining Techniques
A Survey of Online Credit Card Fraud Detection using Data Mining TechniquesA Survey of Online Credit Card Fraud Detection using Data Mining Techniques
A Survey of Online Credit Card Fraud Detection using Data Mining TechniquesIJSRD
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...Aparna Nk
 
Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptographySaurabh Nambiar
 
Analysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detectionAnalysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detectionJustluk Luk
 
Credit card fraud detection methods using Data-mining.pptx (2)
Credit card fraud detection methods using Data-mining.pptx (2)Credit card fraud detection methods using Data-mining.pptx (2)
Credit card fraud detection methods using Data-mining.pptx (2)k.surya kumar
 

Andere mochten auch (20)

Documents About [Credit Card]
Documents About [Credit Card]Documents About [Credit Card]
Documents About [Credit Card]
 
OpenCard hack (projekt chameleon)
OpenCard hack (projekt chameleon)OpenCard hack (projekt chameleon)
OpenCard hack (projekt chameleon)
 
Dangerous google dorks
Dangerous google dorksDangerous google dorks
Dangerous google dorks
 
Luhn algorithm
Luhn algorithmLuhn algorithm
Luhn algorithm
 
So you want to be an EMV Issuer...
So you want to be an EMV Issuer...So you want to be an EMV Issuer...
So you want to be an EMV Issuer...
 
Payer Authentication Solutions For Verified by VISA
Payer Authentication Solutions For Verified by VISAPayer Authentication Solutions For Verified by VISA
Payer Authentication Solutions For Verified by VISA
 
Google dorks
Google dorksGoogle dorks
Google dorks
 
Pine Labs Loyalty Solution - Nova
Pine Labs Loyalty Solution - NovaPine Labs Loyalty Solution - Nova
Pine Labs Loyalty Solution - Nova
 
Black Hat 2011 - Pulp Google Hacking: The Next Generation Search Engine Hacki...
Black Hat 2011 - Pulp Google Hacking: The Next Generation Search Engine Hacki...Black Hat 2011 - Pulp Google Hacking: The Next Generation Search Engine Hacki...
Black Hat 2011 - Pulp Google Hacking: The Next Generation Search Engine Hacki...
 
NFC attacks
NFC attacksNFC attacks
NFC attacks
 
credit card theft
credit card theftcredit card theft
credit card theft
 
Brute Forcing
Brute ForcingBrute Forcing
Brute Forcing
 
Hacking Smartcards & RFID
Hacking Smartcards & RFIDHacking Smartcards & RFID
Hacking Smartcards & RFID
 
Mifare Desfire Technology
Mifare Desfire TechnologyMifare Desfire Technology
Mifare Desfire Technology
 
A Survey of Online Credit Card Fraud Detection using Data Mining Techniques
A Survey of Online Credit Card Fraud Detection using Data Mining TechniquesA Survey of Online Credit Card Fraud Detection using Data Mining Techniques
A Survey of Online Credit Card Fraud Detection using Data Mining Techniques
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...
 
Tapping into the core
Tapping into the coreTapping into the core
Tapping into the core
 
Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptography
 
Analysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detectionAnalysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detection
 
Credit card fraud detection methods using Data-mining.pptx (2)
Credit card fraud detection methods using Data-mining.pptx (2)Credit card fraud detection methods using Data-mining.pptx (2)
Credit card fraud detection methods using Data-mining.pptx (2)
 

Ähnlich wie Guessing CVV, Spoofing Payment and Experiences with Fraud Detection Systems

Hacking Point of Sale
Hacking Point of SaleHacking Point of Sale
Hacking Point of SaleTripwire
 
Verizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachVerizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachUlf Mattsson
 
Digital crimescene emv_update_nrfprotect17_skipmyersbethprovenzano_final061217
Digital crimescene emv_update_nrfprotect17_skipmyersbethprovenzano_final061217Digital crimescene emv_update_nrfprotect17_skipmyersbethprovenzano_final061217
Digital crimescene emv_update_nrfprotect17_skipmyersbethprovenzano_final061217National Retail Federation
 
Digital Payment Quo Vadis
Digital Payment Quo VadisDigital Payment Quo Vadis
Digital Payment Quo VadisNetcetera
 
What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?Evernym
 
3D-Secure 2.2 Webinar
3D-Secure 2.2 Webinar3D-Secure 2.2 Webinar
3D-Secure 2.2 WebinarIvona M
 
PCI DSS Training compliance training for companies
PCI DSS Training compliance training for companiesPCI DSS Training compliance training for companies
PCI DSS Training compliance training for companiesgealehegn
 
Credit Scoring: The secret to success of e-payment schemes
Credit Scoring: The secret to success of e-payment schemesCredit Scoring: The secret to success of e-payment schemes
Credit Scoring: The secret to success of e-payment schemesStefan Schicker
 
Cryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingCryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingHai Nguyen
 
The 3-D Secure Protocol
The 3-D Secure ProtocolThe 3-D Secure Protocol
The 3-D Secure ProtocolVlad Petre
 
INTERNET BANKING & SECURITY ANALYSIS
INTERNET BANKING & SECURITY ANALYSISINTERNET BANKING & SECURITY ANALYSIS
INTERNET BANKING & SECURITY ANALYSISRAHUL KUMAR
 
Business2Blockchain | ID, Profile & Data Management
Business2Blockchain | ID, Profile & Data ManagementBusiness2Blockchain | ID, Profile & Data Management
Business2Blockchain | ID, Profile & Data ManagementMorne Olivier
 
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...Jonathan Care
 
Merchant Account Tips: Proven Methods for Reducing Online Credit Card Fraud &...
Merchant Account Tips: Proven Methods for Reducing Online Credit Card Fraud &...Merchant Account Tips: Proven Methods for Reducing Online Credit Card Fraud &...
Merchant Account Tips: Proven Methods for Reducing Online Credit Card Fraud &...CDGcommerce
 
EFTsure Presentation
EFTsure PresentationEFTsure Presentation
EFTsure PresentationIanMirels
 
EFTsure presentation
EFTsure presentationEFTsure presentation
EFTsure presentationIanMirels
 
EFTsure presentation
EFTsure presentationEFTsure presentation
EFTsure presentationIanMirels
 

Ähnlich wie Guessing CVV, Spoofing Payment and Experiences with Fraud Detection Systems (20)

Hacking Point of Sale
Hacking Point of SaleHacking Point of Sale
Hacking Point of Sale
 
Verizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachVerizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breach
 
Digital crimescene emv_update_nrfprotect17_skipmyersbethprovenzano_final061217
Digital crimescene emv_update_nrfprotect17_skipmyersbethprovenzano_final061217Digital crimescene emv_update_nrfprotect17_skipmyersbethprovenzano_final061217
Digital crimescene emv_update_nrfprotect17_skipmyersbethprovenzano_final061217
 
Requirement of PCI-DSS in India.
Requirement of PCI-DSS in India.Requirement of PCI-DSS in India.
Requirement of PCI-DSS in India.
 
Digital Payment Quo Vadis
Digital Payment Quo VadisDigital Payment Quo Vadis
Digital Payment Quo Vadis
 
What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?
 
3D-Secure 2.2 Webinar
3D-Secure 2.2 Webinar3D-Secure 2.2 Webinar
3D-Secure 2.2 Webinar
 
MTBiz May-June 2019
MTBiz May-June 2019 MTBiz May-June 2019
MTBiz May-June 2019
 
PCI DSS Training compliance training for companies
PCI DSS Training compliance training for companiesPCI DSS Training compliance training for companies
PCI DSS Training compliance training for companies
 
Credit Scoring: The secret to success of e-payment schemes
Credit Scoring: The secret to success of e-payment schemesCredit Scoring: The secret to success of e-payment schemes
Credit Scoring: The secret to success of e-payment schemes
 
Cryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingCryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for banking
 
The 3-D Secure Protocol
The 3-D Secure ProtocolThe 3-D Secure Protocol
The 3-D Secure Protocol
 
INTERNET BANKING & SECURITY ANALYSIS
INTERNET BANKING & SECURITY ANALYSISINTERNET BANKING & SECURITY ANALYSIS
INTERNET BANKING & SECURITY ANALYSIS
 
Business2Blockchain | ID, Profile & Data Management
Business2Blockchain | ID, Profile & Data ManagementBusiness2Blockchain | ID, Profile & Data Management
Business2Blockchain | ID, Profile & Data Management
 
Cards Center Workshop
Cards Center WorkshopCards Center Workshop
Cards Center Workshop
 
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
 
Merchant Account Tips: Proven Methods for Reducing Online Credit Card Fraud &...
Merchant Account Tips: Proven Methods for Reducing Online Credit Card Fraud &...Merchant Account Tips: Proven Methods for Reducing Online Credit Card Fraud &...
Merchant Account Tips: Proven Methods for Reducing Online Credit Card Fraud &...
 
EFTsure Presentation
EFTsure PresentationEFTsure Presentation
EFTsure Presentation
 
EFTsure presentation
EFTsure presentationEFTsure presentation
EFTsure presentation
 
EFTsure presentation
EFTsure presentationEFTsure presentation
EFTsure presentation
 

Mehr von Positive Hack Days

Инструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release NotesИнструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release NotesPositive Hack Days
 
Как мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows DockerКак мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows DockerPositive Hack Days
 
Типовая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive TechnologiesТиповая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive TechnologiesPositive Hack Days
 
Аналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + QlikАналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + QlikPositive Hack Days
 
Использование анализатора кода SonarQube
Использование анализатора кода SonarQubeИспользование анализатора кода SonarQube
Использование анализатора кода SonarQubePositive Hack Days
 
Развитие сообщества Open DevOps Community
Развитие сообщества Open DevOps CommunityРазвитие сообщества Open DevOps Community
Развитие сообщества Open DevOps CommunityPositive Hack Days
 
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...Positive Hack Days
 
Автоматизация построения правил для Approof
Автоматизация построения правил для ApproofАвтоматизация построения правил для Approof
Автоматизация построения правил для ApproofPositive Hack Days
 
Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»Positive Hack Days
 
Формальные методы защиты приложений
Формальные методы защиты приложенийФормальные методы защиты приложений
Формальные методы защиты приложенийPositive Hack Days
 
Эвристические методы защиты приложений
Эвристические методы защиты приложенийЭвристические методы защиты приложений
Эвристические методы защиты приложенийPositive Hack Days
 
Теоретические основы Application Security
Теоретические основы Application SecurityТеоретические основы Application Security
Теоретические основы Application SecurityPositive Hack Days
 
От экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 летОт экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 летPositive Hack Days
 
Уязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на граблиУязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на граблиPositive Hack Days
 
Требования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПОТребования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПОPositive Hack Days
 
Формальная верификация кода на языке Си
Формальная верификация кода на языке СиФормальная верификация кода на языке Си
Формальная верификация кода на языке СиPositive Hack Days
 
Механизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET CoreМеханизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET CorePositive Hack Days
 
SOC для КИИ: израильский опыт
SOC для КИИ: израильский опытSOC для КИИ: израильский опыт
SOC для КИИ: израильский опытPositive Hack Days
 
Honeywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services CenterHoneywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services CenterPositive Hack Days
 
Credential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атакиCredential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атакиPositive Hack Days
 

Mehr von Positive Hack Days (20)

Инструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release NotesИнструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release Notes
 
Как мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows DockerКак мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows Docker
 
Типовая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive TechnologiesТиповая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive Technologies
 
Аналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + QlikАналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + Qlik
 
Использование анализатора кода SonarQube
Использование анализатора кода SonarQubeИспользование анализатора кода SonarQube
Использование анализатора кода SonarQube
 
Развитие сообщества Open DevOps Community
Развитие сообщества Open DevOps CommunityРазвитие сообщества Open DevOps Community
Развитие сообщества Open DevOps Community
 
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
 
Автоматизация построения правил для Approof
Автоматизация построения правил для ApproofАвтоматизация построения правил для Approof
Автоматизация построения правил для Approof
 
Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»
 
Формальные методы защиты приложений
Формальные методы защиты приложенийФормальные методы защиты приложений
Формальные методы защиты приложений
 
Эвристические методы защиты приложений
Эвристические методы защиты приложенийЭвристические методы защиты приложений
Эвристические методы защиты приложений
 
Теоретические основы Application Security
Теоретические основы Application SecurityТеоретические основы Application Security
Теоретические основы Application Security
 
От экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 летОт экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 лет
 
Уязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на граблиУязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на грабли
 
Требования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПОТребования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПО
 
Формальная верификация кода на языке Си
Формальная верификация кода на языке СиФормальная верификация кода на языке Си
Формальная верификация кода на языке Си
 
Механизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET CoreМеханизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET Core
 
SOC для КИИ: израильский опыт
SOC для КИИ: израильский опытSOC для КИИ: израильский опыт
SOC для КИИ: израильский опыт
 
Honeywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services CenterHoneywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services Center
 
Credential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атакиCredential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атаки
 

Kürzlich hochgeladen

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Kürzlich hochgeladen (20)

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

Guessing CVV, Spoofing Payment and Experiences with Fraud Detection Systems

  • 1. PHDays 2012 (May 30 / May 31 / 2012 / Moscow) Credit Cards: Guessing CVV, Spoofing Payment and Experiences with Fraud Detection Systems Micha Borrmann SySS GmbH May 31, 2012
  • 2. About my Point of View In most cases I run black box tests against systems and applications I’m employed at a company which is offering professional penetration tests exclusively My point of view is from the attacking perspective; I do neither know the application source code nor detailed network maps All descriptions were found in the course of real professional penetration tests (with strong NDAs): no company names will be published M. Borrmann (SySS GmbH) PHDays 2012 May 31, 2012 2 / 22
  • 3. First Project Long time ago (2007), a popular website ordered a professional penetration test However, they represented a minority of analyzed sites, as I found no SQL injection and only few of the typical issues But there was a possibility at the website for account verification, which could be used with a valid credit card It means, a valid credit card number had to be typed into the web site to verify an account M. Borrmann (SySS GmbH) PHDays 2012 May 31, 2012 3 / 22
  • 4. Using a Credit Card on the Web Card Holder Name Credit card number Expiration date Card Security Code (CVV) Card security code The card security code (CSC), sometimes called Card Verification Data (CVD), Card Verification Value (CVV or CVV2), Card Verification Value Code (CVVC), Card Verification Code (CVC or CVC2), Verification Code (V-Code or V Code), or Card Code Verification (CCV) are different terms for security features for credit or debit card transactions, providing increased protection against credit card fraud. http://en.wikipedia.org/wiki/Card_security_code M. Borrmann (SySS GmbH) PHDays 2012 May 31, 2012 4 / 22
  • 5. CVV Generation of card security codes CVC1, CVV1, CVC2 and CVV2 values are generated when the card is issued. The values are calculated by encrypting the bank card number (also known as the primary account number or PAN), expiration date and service code with encryption keys (often called Card Verification Key or CVK) known only to the issuing bank, and decimalising the result. http://en.wikipedia.org/wiki/Card_security_code#Generation_ of_card_security_codes M. Borrmann (SySS GmbH) PHDays 2012 May 31, 2012 5 / 22
  • 6. PCI (Payment Card Industry) https://www.pcisecuritystandards.org/documents/navigating_dss_v20.pdf M. Borrmann (SySS GmbH) PHDays 2012 May 31, 2012 6 / 22
  • 7. PCI (Payment Card Industry) Sensitive authentication data must not be stored after authorization (even if encrypted). https://www.pcisecuritystandards.org/documents/navigating_dss_v20.pdf M. Borrmann (SySS GmbH) PHDays 2012 May 31, 2012 6 / 22
  • 8. Guessing CVV? Client Not our business There are a lot of fraud detection systems bank-side and your check will fail You can check it if you want (yeah!) M. Borrmann (SySS GmbH) PHDays 2012 May 31, 2012 7 / 22
  • 9. Guessing CVV? Client Not our business There are a lot of fraud detection systems bank-side and your check will fail You can check it if you want (yeah!) Result (using the MasterCard of my boss) A script which can easily be written runs all possible CVV (000 to 999) for a given credit card number (needs around some hours) M. Borrmann (SySS GmbH) PHDays 2012 May 31, 2012 7 / 22
  • 10. Guessing CVV? Client Not our business There are a lot of fraud detection systems bank-side and your check will fail You can check it if you want (yeah!) Result (using the MasterCard of my boss) A script which can easily be written runs all possible CVV (000 to 999) for a given credit card number (needs around some hours) 999 error messages were received and 1 success message The CVV to a given credit card number was successfully guessed Where was the fraud prevention system? M. Borrmann (SySS GmbH) PHDays 2012 May 31, 2012 7 / 22
  • 11. Brave CVV Guessing Only expiration date, credit card number and CVV had to be put in (no card holder name) CVV is not possible to know What happens if the expiration date is not known either? M. Borrmann (SySS GmbH) PHDays 2012 May 31, 2012 8 / 22
  • 12. Brave CVV Guessing Only expiration date, credit card number and CVV had to be put in (no card holder name) CVV is not possible to know What happens if the expiration date is not known either? Check 36 parallel scripts were run (for the next 36 months as expiration date) M. Borrmann (SySS GmbH) PHDays 2012 May 31, 2012 8 / 22
  • 13. Brave CVV Guessing Only expiration date, credit card number and CVV had to be put in (no card holder name) CVV is not possible to know What happens if the expiration date is not known either? Check 36 parallel scripts were run (for the next 36 months as expiration date) Result The issuing bank called my boss as they detected strange activities on his MasterCard and the card was revoked immediately. Fraud detection systems do exist! M. Borrmann (SySS GmbH) PHDays 2012 May 31, 2012 8 / 22
  • 14. Expiration Date It is not absolutely neccessary to guess it because it is not tagged as secure Written on a lot of receipts, sometimes also with the entire credit card number M. Borrmann (SySS GmbH) PHDays 2012 May 31, 2012 9 / 22
  • 15. Expiration Date It is not absolutely neccessary to guess it because it is not tagged as secure Written on a lot of receipts, sometimes also with the entire credit card number M. Borrmann (SySS GmbH) PHDays 2012 May 31, 2012 9 / 22
  • 16. Expiration Date It is not absolutely neccessary to guess it because it is not tagged as secure Written on a lot of receipts, sometimes also with the entire credit card number M. Borrmann (SySS GmbH) PHDays 2012 May 31, 2012 9 / 22
  • 17. The Never Ending Story Starts In November 2007 a hack into a big German website was in the media The website used to sell tickets for self-print out The stolen data also included CVV data A German TV team asked: What do you know about credit card security? The answer was: We can guess the CVV of your credit cards The TV guys asked for a demonstration Used another website (not my customer’s website), as the attack was not against a website but against a credit card number I had checked my script one day before the appointment with the TV guys successfully (with the new credit card of my boss) M. Borrmann (SySS GmbH) PHDays 2012 May 31, 2012 10 / 22
  • 18. First CVV Guessing in the Media The website changed their setup and behaviour on that day, when the TV guys were in my office More live demonstration than I expected before They xeroxed a front side of a VISA and a MasterCard and this sheet of paper was given to me M. Borrmann (SySS GmbH) PHDays 2012 May 31, 2012 11 / 22
  • 19. First CVV Guessing in the Media The website changed their setup and behaviour on that day, when the TV guys were in my office More live demonstration than I expected before They xeroxed a front side of a VISA and a MasterCard and this sheet of paper was given to me Well, after waiting less than two hours, I got the current CVV values! No fraud detection system could be detected M. Borrmann (SySS GmbH) PHDays 2012 May 31, 2012 11 / 22
  • 20. First CVV Guessing in the Media The website changed their setup and behaviour on that day, when the TV guys were in my office More live demonstration than I expected before They xeroxed a front side of a VISA and a MasterCard and this sheet of paper was given to me Well, after waiting less than two hours, I got the current CVV values! No fraud detection system could be detected Statement from Credit Card Industry VISA: Additional measurements enforce, that stolen credit card data are only minimally useable by criminals M. Borrmann (SySS GmbH) PHDays 2012 May 31, 2012 11 / 22
  • 21. The Story Goes On In May 2011 a journalist of the German magazine DIE ZEIT was investigating about insecurity and he detected the formerly published attack of CVV guessing. He asked me, is it still possible? Well, let’s try! I also got two credit card data (credit card number and expiration date): 1 MasterCard and 1 VISA (both represent more than 90% of the market in Germany) It was not possible for me to simple increase the numbers for the CVV as there was an automatic fraud detection system. Wow! M. Borrmann (SySS GmbH) PHDays 2012 May 31, 2012 12 / 22
  • 22. Analyzing the Detected Anti Fraud System After 3 invalid CVV within 15 minutes a message came back indicating that such a solution seems to be active: Payment declined by AFDS (AFDS-HFC) AFDS sounds like Automatic Fraud Detection System, isn’t?! You can wait for 15 minutes after 3 invalid attempts, but it takes too much time Need for speed? Change the source IP number! It can be scripted with open proxies, Tor Project ... M. Borrmann (SySS GmbH) PHDays 2012 May 31, 2012 13 / 22
  • 23. Strange Results Result 4 years after the first public demonstration, an automatic fraud detection system simply to be bypassed was detected M. Borrmann (SySS GmbH) PHDays 2012 May 31, 2012 14 / 22
  • 24. Strange Results Result 4 years after the first public demonstration, an automatic fraud detection system simply to be bypassed was detected VISA Two valid useable CVV for the given VISA card were detected. One was printed on the backside the other one is an additional value. Maybe, there is a collision attack within the generating algorithm. M. Borrmann (SySS GmbH) PHDays 2012 May 31, 2012 14 / 22
  • 25. Entertainment The article in the magazine DIE ZEIT was read by a radio journalist He did not believe that this was a true story (in summer 2011) He interviewed me for a radio station and he sent me two credit card numbers and the expiration dates via text message (but of course, no CVV and no cardholders name) I used the name “Joe Smith” as cardholder’s name but you can expect the result M. Borrmann (SySS GmbH) PHDays 2012 May 31, 2012 15 / 22
  • 26. Entertainment The article in the magazine DIE ZEIT was read by a radio journalist He did not believe that this was a true story (in summer 2011) He interviewed me for a radio station and he sent me two credit card numbers and the expiration dates via text message (but of course, no CVV and no cardholders name) I used the name “Joe Smith” as cardholder’s name but you can expect the result I successfully detected the CVV This radio interview was also heared by Ukrainian people There was another interview and the first non-German notice about it: http://www.dw.de/dw/article/0,,15295808,00.html M. Borrmann (SySS GmbH) PHDays 2012 May 31, 2012 15 / 22
  • 27. Bypassing Credit Card Payment, First Minds Do you remember the first little film with the increasing numbers on my laptop screen? The numbers on the screen were mostly for the TV guys However, during the time the cameraman was behind me, I detected a strange behaviour: an invalid CVV was responded with a redirect to https://webshop.com/error.php but the valid CVV was responded with a redirect to https://webshop.com/success.php Big question What happens if I go to https://webshop.com/success.php directly? M. Borrmann (SySS GmbH) PHDays 2012 May 31, 2012 16 / 22
  • 28. Using a Payment Provider These providers are popular because the web shops do not store credit card data and do not need a PCI certificate How does the communication between the web shop and the payment provider work? directly via the browser of the user (this is useful for manipulations, yeah) M. Borrmann (SySS GmbH) PHDays 2012 May 31, 2012 17 / 22
  • 29. Using a Payment Provider (via the User’s Browser) webshop.com paymentprovider.com user M. Borrmann (SySS GmbH) PHDays 2012 May 31, 2012 18 / 22
  • 30. Using a Payment Provider (via the User’s Browser) webshop.com paymentprovider.com ifr am e at pa ym en tp ro vi de r. co m user M. Borrmann (SySS GmbH) PHDays 2012 May 31, 2012 18 / 22
  • 31. Using a Payment Provider (via the User’s Browser) webshop.com paymentprovider.com ifr ) am VV e C at g pa d in ym clu en ( in tp a ro D at vi de ard r. tC co m edi Cr user M. Borrmann (SySS GmbH) PHDays 2012 May 31, 2012 18 / 22
  • 32. Using a Payment Provider (via the User’s Browser) webshop.com paymentprovider.com ifr hp ) am 2 ror.p VV e 3 0 r C at e /e g pa C od com d in ym P op. clu en TT sh H eb ( in tp a ro s :// w D at vi tp d de ht ar r. C co it m ed Cr user M. Borrmann (SySS GmbH) PHDays 2012 May 31, 2012 18 / 22
  • 33. Using a Payment Provider (via the User’s Browser) webshop.comht paymentprovider.com ifr tp am s: hp ) e //w eb 2 ror.p 0 r C VV 3 at sh e /e g pa op .c C od com d in ym om P op. clu en /s TT sh H eb ( in tp uc a ro ce ss s :// w D at vi .p tp d de hp ht ar r. C co it m ed Cr user M. Borrmann (SySS GmbH) PHDays 2012 May 31, 2012 18 / 22
  • 34. Using a Payment Provider (via the User’s Browser) Result If you get a message like “thank you for your order” than it seems that your payment was webshop.comht paymentprovider.com ifr tp successfully spoofed am s: hp ) e //w eb 2 ror.p 0 r C VV 3 at sh e /e g pa op .c C od com d in ym om P op. clu en /s TT sh H eb ( in tp uc a ro ce ss s :// w D at vi .p tp d de hp ht ar r. C co it m ed Cr user M. Borrmann (SySS GmbH) PHDays 2012 May 31, 2012 18 / 22
  • 35. Successfully Bypassing Credit Card Payment Successfully tested against a friendly shop in January 2008 On some payment providers, the web shop can enable an optional (!!!) security feature: a hash is calculated over a string which includes a password and the total to be paid and this hash is additionally transferred M. Borrmann (SySS GmbH) PHDays 2012 May 31, 2012 19 / 22
  • 36. Successfully Bypassing Credit Card Payment Successfully tested against a friendly shop in January 2008 On some payment providers, the web shop can enable an optional (!!!) security feature: a hash is calculated over a string which includes a password and the total to be paid and this hash is additionally transferred Has anybody ever heard of a replay attack? An article for a German computer magazine (c’t) was held back until the trade fair CeBIT 2008 This kind of attack was described and presented at the CeBIT (March 2008) M. Borrmann (SySS GmbH) PHDays 2012 May 31, 2012 19 / 22
  • 37. Successfully Bypassing Credit Card Payment Successfully tested against a friendly shop in January 2008 On some payment providers, the web shop can enable an optional (!!!) security feature: a hash is calculated over a string which includes a password and the total to be paid and this hash is additionally transferred Has anybody ever heard of a replay attack? An article for a German computer magazine (c’t) was held back until the trade fair CeBIT 2008 This kind of attack was described and presented at the CeBIT (March 2008) In summer 2008 I was penetration testing a foreign web shop It was possible for me to successfully spoof a valid credit card payment for the first time; the box with the product was shipped to Germany M. Borrmann (SySS GmbH) PHDays 2012 May 31, 2012 19 / 22
  • 38. Other topics with payment providers Parameter fraud_detection=yes Not only related to payment with credit cards Thibault Koechlin from NBS System talked about Naxsi (http://code.google.com/p/naxsi/) this morning NBS System has written an advisory for a similar attack: http://www.nbs-system.co.uk/blog-2/security/ magento-paypal-vulnerability.html M. Borrmann (SySS GmbH) PHDays 2012 May 31, 2012 20 / 22
  • 39. Other topics with payment providers Parameter fraud_detection=yes Not only related to payment with credit cards Thibault Koechlin from NBS System talked about Naxsi (http://code.google.com/p/naxsi/) this morning NBS System has written an advisory for a similar attack: http://www.nbs-system.co.uk/blog-2/security/ magento-paypal-vulnerability.html Attention This kind of bypassing payment is not only related to credit card payment (see advisory related to Paypal) and can not be secured with a web application firewall M. Borrmann (SySS GmbH) PHDays 2012 May 31, 2012 20 / 22
  • 40. Summary and Hints Be careful with credit card receipts Check your credit card balance Do not expect fraud detection systems for CVV guessing Do not trust automatic fraud detection systems for CVV guessing M. Borrmann (SySS GmbH) PHDays 2012 May 31, 2012 21 / 22
  • 41. Summary and Hints Be careful with credit card receipts Check your credit card balance Do not expect fraud detection systems for CVV guessing Do not trust automatic fraud detection systems for CVV guessing Do not call CVV a security feature Do not expect IT security awareness from your payment provider if you are in charge for a web shop Do not trust data from the web shops if you are a payment provider Think about the unthought issues if you are a web programmer M. Borrmann (SySS GmbH) PHDays 2012 May 31, 2012 21 / 22
  • 42. E-Mail micha.borrmann@syss.de PGP fingerprint: 6897 7B33 B359 B8BA 0884 969F FC67 EBA9 1B51 128A M. Borrmann (SySS GmbH) PHDays 2012 May 31, 2012 22 / 22