Credit Card Networks Revisted: Penitration in Real-Time

Presented at DEF CON 12 (2004), Aug. 1, 2004, 3 p.m. (50 minutes)

Credit card authorization is the core to all major businesses, both on and off the Internet. Yet an alarming number of businesses are not taking the right steps to insure that your credit cards are secure against fraud and theft. In bringing this to light (Credit Card Networks 101, July 31 2003 - DC 11), you were awed at the posibility, but were not provided with any real proof. This year we, that's you and I, will walk through the process of identifying credit card traffic on a network, decyfering packets and propagated rouge credit card data to a host comeputer. You will be provided access to a private Wi-Fi network. This networks will have credit card data streamming across it for you to sniff. With your help, we will discover information about credit cards packets, and how to design our own packet to be sent.


Presenters:

  • Jonathan "ripshy" Duncan - Systems Developer to demonstration
  • Robert Imhoff-Dousharm / hackajar - Credit Card Compliancy & Fraud Analyst   as Robert "hackajar" Imhoff-Dousharm
    Robert "hackajar" Imhoff-Dousharm—In the last 2 years, Robert has worked for Shift4, a Credit Transaction Gateway. As an Analyst he insures best fraud practices, compliceny and security are meet at all clients sites He has worked with government agency's during fraud investigations. He also works with new and potential clients to implement best practice in software design of credit card intigration software Robert has spoken at DefCon 11 (Credit Card Networks 101) about the potential risks currenly impeading on credit card networs. He will demonstrate those risks this year with "Credit Card Networks Revisted: Penitration in Real-Time".

Links:

Similar Presentations: