Weston Hecker

Unknown-1Speaker Name: Weston Hecker

Title: Hacking ATMs and Point of Sale a Look at devices used to attack ATMs and POS systems

Abstract

 I will be going over the devices used to attack the ATM and current EMV Relay attacks. This includes the EMV shimmer/Skimmer used on the POS system. The software used to pass the EMV transaction in real time. Some of the hardware to Steal pin numbers in real time and relay them over to the cash out ATM machine. This includes a lot of work with SDR and interference based key capturing with OpenCV. The Cashout card used to relay the stolen card transactions into the ATM . (Modfied Version of Magspoofer) that can do mag-stipe transactions. A look at current generation skimmers and how to defeat ant skimming ATMs I have a microcontroller that defeats “Noise generating ATMs” hardware work around for foreign object detection. Including false keypads. And defeating Horizontal card insertion and other ant skimming methods. I will also take a look at the cell tower that responds to fraud shortcode messages if time permits.

 
About the Speaker
Weston Hecker has been pen-testing for 11 years and has 12 years of experience doing security research and programming. He is currently working for Rapid7. Weston has recently spoken at Blackhat 2016, Defcon 22,23 and 24, Enterprise Connect 2016, ISC2-Security Congress, SC-Congress Toronto, BSIDESBoston, TakdownCON, HOPE 11 and at over 50 other speaking engagements from telecom regional events to Universities on security subject matter. Weston works with a major university’s research project with Department of Homeland Security on 911 emergency systems and attack mitigation. He attended school in Minneapolis Minnesota and studied Computer Science. Weston found several vulnerabilities in very popular software and firmware, including Microsoft, Qualcomm, Samsung, HTC, Verizon.