SlideShare une entreprise Scribd logo
1  sur  8
1
TECHNICAL GUIDELINES ON
How to Secure a POS System from
Hackers
By:
Syed Ubaid Ali Jafri
Information Security Professional
LinkedIn: https://pk.linkedin.com/in/ubaidjafri
2
Contents
Background..............................................................................................................................................................................................................3
Objective..................................................................................................................................................................................................................3
Testing Type .............................................................................................................................................................................................................3
TOP 15 Controls Checklist..........................................................................................................................................................................................4
POS Checklist............................................................................................................................................................................................................7
References................................................................................................................................................................................................................8
3
Background
The payment terminals we are talking about are tamper proof. They usually have Ethernet connectivity, and a serial line. The interface open to normal user is the card
slot and PIN pad, and in some occasions contactless reader. The actual configuration does vary between models and vendors, but the basic idea is that the terminal
initiates all the connections and doesn't listen to anything incoming.
Objective
Our objective for publishing this document is to ensure technically that the initial security up to a level where POS should be secure from basic attacks.
Testing Type
This testing involves the Physical layer to Presentation Layer testing which includes the following controls but not limited to
S.No Control Name
1 Insecure Physical Connectivity
2 IP/MAC Address Spoofing
3 Weak or Default credentials on Device
4 Insecure Communication Protocol
5 Unencrypted Data Travelling
6 Insecure Data Storage
7 Sensitive Information Disclosure
8 Shared File Enumeration
9 Stress testing of PoS Machine
10 Inadequate Transaction Handling
11 Un-necessary services/Ports open
12 Absence of Audit Logging
13 Missing Patches
14 SNMP public community string
15 SSL/TLS Configuration Weaknesses
4
TOP 15 Controls Checklist
Summary Sheet of Controls
S. No Control Name Control Description Severity Impact
1 Physical Connectivity of PoS
The Network connectivity of of PoS device
whether the device is connected with
Wireless Router or with LAN Switch. Ensure
that no other user is able to connect to the
same Wifi or LAN Network
High
An attacker or malicious user with local
network access is able to plug their
infected machine with the network
connected to a PoS system, An attacker
would be able to sniff or capture the data
on the network. An attacker can easily
perform a MiTM attack against this
connectivity,
2 IP/MAC Address Spoofing
A network attacker can use a protocol
analyzer to know a valid MAC address, By
examining the MAC Address, An Attacker is
able to spoofed the IP/MAC Address of the
POS Machine
High
An attacker can easily steal the identity of
the device, an attacker can perform the
malicious activity by showing the
legitimate device identity which doesn’t
belong to them.
3 Weak or Default credentials on Device
Device is using the default username or
password for hardware administration
High
An attacker or malicious user is able to
perform modification by using the default
credentials on device, an attacker is able
to change or modify the hardware
configurations on device.
4 Insecure Communication Protocol
Device is using the weak protocols (FTP,
Telnet, VNC, RDP) for remote administration
which could lead towards confidentiality,
intigrity , availability attack
High
An attacker or malicious user, with local
network access, is able to perform a Man-
in-the-Middle attack (MITM) and can see
all communication between the POS and
the FTP server on the. Using a username
and password obtained by passively
sniffing traffic on the network, the attacker
can connect to the FTP server, download,
modify, and then upload arbitrary files
5 Unencrypted Data Travelling
Device is able to send data unencrypted on
Wifi/LAN channel
High
An Attacker or malicious user, with local
network access, is able to perform a
sniffing attack on Wi-Fi/LAN Network.
Capturing the unencrypted traffic contains
the sensitive information of (Usernames,
Password, accounts information)
5
6 Insecure Data Storage
Device is able to store the data on Memory
card or in the device itself
High
An attacker is able to copy all the stored
data on the machine or in the memory
card, which could help an attacker to
generate the fake card of original values
stored in the device or memory card, by
using different strip card reader writer
machines.
7 Sensitive Information Disclosure
Device is capable to exposing the sensitive
data which contains (Track 1 record, Track 2
record and CVV Number of customer
High
An attacker is able to read or sniff the
Track-1, Track-2 Data of customer which
could impact towards fake card
generation or online sale purchasing of
goods.
8 Shared File Enumeration
Device has multiple open folders that are
shared and has access to the root directory
directly
High
This may directly lead to system
compromise by allowing modification of
system files.
9 Stress Testing of Pos Terminal
The device is not capable for handling huge
load on the network, the devices is able to
randomly shut down and restart ports on the
network switches/routers that connect the
servers (via SNMP commands for example),
double the baseline number for concurrent
users/HTTP connections
High
An attacker using less skills can perform
the attacker on the system which could
lead towards availability attack.
10 Inadequate Transaction Handling
An attacker is able to retrieve the
configuration information from the Server, the
authentication takes place in plaintext over
the local network, and all the transactions are
shown in plaintext in the text file.
High
An attacker can perform the Man-in-the-
Middle attack and can change the price
value, modify the items and their date.
11 Un-necessary services/Ports open
There are multiple ports that are open and not
being used on the device
Medium
By using unused port an attacker can
perform a brute force attack or sending
the SYN request to the terminal machine
which could lead towards availability
attack.
6
12 Absence of Audit Logging
Device is not able to record the logs of
(Logged in, Transactions, Network
Connectivity)
Medium
Due to absence of Audit Logging, An
attacker can easily perform malicious
activities and hide their tracks.
13 Missing Patches
Critical Microsoft security patches were not
installed on the PoS Sytem. The missing
patches address vulnerabilities which may
allow unauthenticated remote code execution,
privilege escalation, denial of service, and
confidential information disclosure
Medium
An attacker or malicious user with
network access may be able to view
sensitive information, cause Denial-of-
Service, or execute arbitrary code. An
attacker with local access to the hosts
may be able to escalate their privileges
up to the administrator level.
14 SNMP public community string
Simple Network Management Protocol
(SNMP) community string ‘public’ is used on
the PoS Machine, granting READ-ONLY
access to information on remote hosts. SNMP
is generally used for system and network
monitoring purposes. Typically, a remote
network management server queries a
remote SNMP agent (residing on the target
system) for system status, by supplying a
community string for authentication.
Medium
An attacker or malicious user is able to
use the default SNMP community string
to discover detailed device metadata and
network configuration details, which can
assist in other attacks. The information
disclosed includes the operating system
version, a list of users on the system, a
list of installed software, any enabled
network interfaces, routing information, as
well as any open TCP connections.
15 SSL/TLS Configuration Weaknesses
Secure Sockets Layer (SSL) and Transport
Layer Security (TLS) are used in the POS
environment to protect the confidentiality and
integrity of connections to database servers,
and to the administrative web interface of the
site router. We identified the following
misconfigurations with the implementation of
SSL/TLS.
Medium
An attacker or malicious user with
network access is able to impersonate
SSL/TLS-protected services, or carry out
Man-in-The-Middle attacks, compromising
the confidentiality and integrity of
encrypted network communications.
These communications may include
sensitive business information such as
transactions and payment data, as well as
technical information such as credentials
or configuration files
7
POS Checklist
A pointof sales(POS) systems needsassessmentisessential forplanningthe selectionand deploymentof pointof salessystem. Thischecklistwillassist
indefiningsystemrequirementsandwill also provide the foundationforVulnerabilitywhichcouldbe foundinthe control,the riskassociatedwiththe
vulnerability,itsimpactanalysis,anditstechnical recommendationswhichincludes(Configurational changes,Proceduralchanges,Software/Services
changesetc.)
PoS (Point of Sale ) Information Security Checklist
S. No Control Name Control Presence Risk Description Impact Severity Recommendation
1 
2 
3 
4
5 
8
References
1 http://www.internetsociety.org/doc/addressing-challenge-ip-spoofing
2 http://www.guru99.com/testing-for-retail-pos-point-of-sale-system.html
3 https://community.hpe.com/t5/Security-Research/Hacking-POS-Terminal-for-Fun-and-Non-profit/ba-p/6540620#.WEfkGNV97IU
4 http://www.pcworld.com/article/259882/vulnerabilities_in_payment_terminals_demonstrated_at_black_hat.html
5 https://pen-testing.sans.org/blog/2014/06/12/pen-testing-payment-terminals-a-step-by-step-how-to-guide
6 http://www.slideshare.net/evilhackerz/penetration-testing-guidancemarch2015

Contenu connexe

Tendances

Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanAhmed Musaad
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxDinesh582831
 
Employee security awareness communication
Employee security awareness communicationEmployee security awareness communication
Employee security awareness communicationSnapComms
 
Cybersecurity awareness posters
Cybersecurity awareness postersCybersecurity awareness posters
Cybersecurity awareness postersNetLockSmith
 
Key logger,Why? and How to prevent Them?
Key logger,Why? and  How to prevent Them?Key logger,Why? and  How to prevent Them?
Key logger,Why? and How to prevent Them?Bibek Sharma
 
Cryptojacking - by Vishwaraj101
Cryptojacking - by Vishwaraj101Cryptojacking - by Vishwaraj101
Cryptojacking - by Vishwaraj101v_raj
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness TrainingDave Monahan
 
Computer security risks
Computer security risksComputer security risks
Computer security risksAasim Mushtaq
 
Cyber security ppt final
Cyber security ppt finalCyber security ppt final
Cyber security ppt finalSanishShrestha2
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness Net at Work
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness TrainingJen Ruhman
 
It security and awareness training 5 10-2018
It security and awareness training 5 10-2018It security and awareness training 5 10-2018
It security and awareness training 5 10-2018jubke
 

Tendances (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing Sudan
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
Employee security awareness communication
Employee security awareness communicationEmployee security awareness communication
Employee security awareness communication
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyber security
Cyber securityCyber security
Cyber security
 
cyber_security
cyber_securitycyber_security
cyber_security
 
Cybersecurity awareness posters
Cybersecurity awareness postersCybersecurity awareness posters
Cybersecurity awareness posters
 
Key logger,Why? and How to prevent Them?
Key logger,Why? and  How to prevent Them?Key logger,Why? and  How to prevent Them?
Key logger,Why? and How to prevent Them?
 
Cryptojacking - by Vishwaraj101
Cryptojacking - by Vishwaraj101Cryptojacking - by Vishwaraj101
Cryptojacking - by Vishwaraj101
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
 
Windows Hacking
Windows HackingWindows Hacking
Windows Hacking
 
Computer security
Computer securityComputer security
Computer security
 
Cyber security ppt final
Cyber security ppt finalCyber security ppt final
Cyber security ppt final
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Cyber security
Cyber securityCyber security
Cyber security
 
It security and awareness training 5 10-2018
It security and awareness training 5 10-2018It security and awareness training 5 10-2018
It security and awareness training 5 10-2018
 

En vedette

POS System
POS SystemPOS System
POS SystemHaptism
 
Open Street Map Moldova Project (sotm09)
Open Street Map Moldova Project (sotm09)Open Street Map Moldova Project (sotm09)
Open Street Map Moldova Project (sotm09)Anatolie Golovco
 
Advantages Of SQL
Advantages Of SQL Advantages Of SQL
Advantages Of SQL Intellipaat
 
Simplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USMSimplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USMAlienVault
 
Edc Machine User Guide
Edc Machine User GuideEdc Machine User Guide
Edc Machine User GuideKoson Nontaman
 
Advantages of pl sql
Advantages of pl sqlAdvantages of pl sql
Advantages of pl sqlIntellipaat
 
Group 1 pos system
Group 1   pos systemGroup 1   pos system
Group 1 pos systemmichael21120
 
Advantages And Benefits Of MIS In Your Career
Advantages And Benefits Of MIS In Your CareerAdvantages And Benefits Of MIS In Your Career
Advantages And Benefits Of MIS In Your Careermisc
 
proposal on point of sale information system of a super store
proposal on point of sale information system of a super storeproposal on point of sale information system of a super store
proposal on point of sale information system of a super storeHAMMAD AHMAD
 
Restaurant Management System
Restaurant Management SystemRestaurant Management System
Restaurant Management SystemJuliasmith1985
 
Network Proposal Power Point
Network Proposal Power PointNetwork Proposal Power Point
Network Proposal Power Pointguest7fbe17
 
Software Requirements Specification for restaurant management system
Software Requirements Specification for restaurant management systemSoftware Requirements Specification for restaurant management system
Software Requirements Specification for restaurant management systemSM. Aurnob
 
Advantages of MIS
Advantages of MISAdvantages of MIS
Advantages of MISMihir Busa
 
Advantages and Disadvantages of MIS
Advantages and Disadvantages of MISAdvantages and Disadvantages of MIS
Advantages and Disadvantages of MISNeeti Naag
 
Restaurant Management Systems
Restaurant Management SystemsRestaurant Management Systems
Restaurant Management SystemsAnil Bilgihan
 
Restaurent management system
Restaurent management systemRestaurent management system
Restaurent management systemSmit Patel
 

En vedette (19)

POS System
POS SystemPOS System
POS System
 
Open Street Map Moldova Project (sotm09)
Open Street Map Moldova Project (sotm09)Open Street Map Moldova Project (sotm09)
Open Street Map Moldova Project (sotm09)
 
Advantages Of SQL
Advantages Of SQL Advantages Of SQL
Advantages Of SQL
 
Advantages of mis
Advantages of misAdvantages of mis
Advantages of mis
 
Simplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USMSimplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USM
 
Edc Machine User Guide
Edc Machine User GuideEdc Machine User Guide
Edc Machine User Guide
 
Advantages of pl sql
Advantages of pl sqlAdvantages of pl sql
Advantages of pl sql
 
Group 1 pos system
Group 1   pos systemGroup 1   pos system
Group 1 pos system
 
Advantages And Benefits Of MIS In Your Career
Advantages And Benefits Of MIS In Your CareerAdvantages And Benefits Of MIS In Your Career
Advantages And Benefits Of MIS In Your Career
 
proposal on point of sale information system of a super store
proposal on point of sale information system of a super storeproposal on point of sale information system of a super store
proposal on point of sale information system of a super store
 
Order now – restaurant management system
Order now – restaurant management systemOrder now – restaurant management system
Order now – restaurant management system
 
Restaurant Management System
Restaurant Management SystemRestaurant Management System
Restaurant Management System
 
Network Proposal Power Point
Network Proposal Power PointNetwork Proposal Power Point
Network Proposal Power Point
 
Point of Sale (POS)
Point of Sale (POS)Point of Sale (POS)
Point of Sale (POS)
 
Software Requirements Specification for restaurant management system
Software Requirements Specification for restaurant management systemSoftware Requirements Specification for restaurant management system
Software Requirements Specification for restaurant management system
 
Advantages of MIS
Advantages of MISAdvantages of MIS
Advantages of MIS
 
Advantages and Disadvantages of MIS
Advantages and Disadvantages of MISAdvantages and Disadvantages of MIS
Advantages and Disadvantages of MIS
 
Restaurant Management Systems
Restaurant Management SystemsRestaurant Management Systems
Restaurant Management Systems
 
Restaurent management system
Restaurent management systemRestaurent management system
Restaurent management system
 

Similaire à Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hackers

Security communication
Security communicationSecurity communication
Security communicationSay Shyong
 
Top 20 cyber security interview questions and answers in 2023.pdf
Top 20 cyber security interview questions and answers in 2023.pdfTop 20 cyber security interview questions and answers in 2023.pdf
Top 20 cyber security interview questions and answers in 2023.pdfAnanthReddy38
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center FundamentalAmir Hossein Zargaran
 
System and web security
System and web securitySystem and web security
System and web securitychirag patil
 
Top 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdfTop 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdfinfosec train
 
Seucrity in a nutshell
Seucrity in a nutshellSeucrity in a nutshell
Seucrity in a nutshellYahia Kandeel
 
VTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesVTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesJayanth Dwijesh H P
 
Network and Security-2.pptx
Network and Security-2.pptxNetwork and Security-2.pptx
Network and Security-2.pptxDhanvanthkesavan
 
Backdoor Entry to a Windows Computer
Backdoor Entry to a Windows ComputerBackdoor Entry to a Windows Computer
Backdoor Entry to a Windows ComputerIRJET Journal
 
The Maple County court is redesigning its network to ensure more secu.docx
 The Maple County court is redesigning its network to ensure more secu.docx The Maple County court is redesigning its network to ensure more secu.docx
The Maple County court is redesigning its network to ensure more secu.docxKomlin1
 
Given below is an issue that you have identified as an issue in a ret.pdf
Given below is an issue that you have identified as an issue in a ret.pdfGiven below is an issue that you have identified as an issue in a ret.pdf
Given below is an issue that you have identified as an issue in a ret.pdfbirajdar2
 
2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx
2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx
2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docxvickeryr87
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Securityprachi67
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical HackingSripati Mahapatra
 

Similaire à Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hackers (20)

Security communication
Security communicationSecurity communication
Security communication
 
Top 20 cyber security interview questions and answers in 2023.pdf
Top 20 cyber security interview questions and answers in 2023.pdfTop 20 cyber security interview questions and answers in 2023.pdf
Top 20 cyber security interview questions and answers in 2023.pdf
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
System and web security
System and web securitySystem and web security
System and web security
 
Top 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdfTop 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdf
 
CNS unit -1.docx
CNS unit -1.docxCNS unit -1.docx
CNS unit -1.docx
 
Seucrity in a nutshell
Seucrity in a nutshellSeucrity in a nutshell
Seucrity in a nutshell
 
UNIT 5 (2).pptx
UNIT 5 (2).pptxUNIT 5 (2).pptx
UNIT 5 (2).pptx
 
VTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notesVTU network security(10 ec832) unit 6 notes
VTU network security(10 ec832) unit 6 notes
 
Network and Security-2.pptx
Network and Security-2.pptxNetwork and Security-2.pptx
Network and Security-2.pptx
 
Backdoor Entry to a Windows Computer
Backdoor Entry to a Windows ComputerBackdoor Entry to a Windows Computer
Backdoor Entry to a Windows Computer
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
The Maple County court is redesigning its network to ensure more secu.docx
 The Maple County court is redesigning its network to ensure more secu.docx The Maple County court is redesigning its network to ensure more secu.docx
The Maple County court is redesigning its network to ensure more secu.docx
 
Given below is an issue that you have identified as an issue in a ret.pdf
Given below is an issue that you have identified as an issue in a ret.pdfGiven below is an issue that you have identified as an issue in a ret.pdf
Given below is an issue that you have identified as an issue in a ret.pdf
 
2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx
2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx
2.· Unshielded Twisted Pair (UTP) Cables· Shielded Twisted Pai.docx
 
Chapter 4.ppt
Chapter 4.pptChapter 4.ppt
Chapter 4.ppt
 
cybersecurity
cybersecuritycybersecurity
cybersecurity
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical Hacking
 

Plus de Syed Ubaid Ali Jafri

Requirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing LabRequirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing LabSyed Ubaid Ali Jafri
 
Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015Syed Ubaid Ali Jafri
 
Android 2.0 - 4.0 HTML Vulnerable
Android 2.0 - 4.0 HTML Vulnerable Android 2.0 - 4.0 HTML Vulnerable
Android 2.0 - 4.0 HTML Vulnerable Syed Ubaid Ali Jafri
 
Data Hiding (An Approach towards Stegnography)
Data Hiding (An Approach towards Stegnography) Data Hiding (An Approach towards Stegnography)
Data Hiding (An Approach towards Stegnography) Syed Ubaid Ali Jafri
 
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali JafriFinal Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali JafriSyed Ubaid Ali Jafri
 
Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7
Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7
Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7Syed Ubaid Ali Jafri
 
Syed Ubaid Ali Jafri - Cryptography Techniques
Syed Ubaid Ali Jafri - Cryptography TechniquesSyed Ubaid Ali Jafri - Cryptography Techniques
Syed Ubaid Ali Jafri - Cryptography TechniquesSyed Ubaid Ali Jafri
 
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for AssociatesSyed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for AssociatesSyed Ubaid Ali Jafri
 
Syed Ubaid Ali Jafri Lecture on Information Technology
Syed Ubaid Ali Jafri Lecture on Information Technology Syed Ubaid Ali Jafri Lecture on Information Technology
Syed Ubaid Ali Jafri Lecture on Information Technology Syed Ubaid Ali Jafri
 

Plus de Syed Ubaid Ali Jafri (18)

Requirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing LabRequirement for creating a Penetration Testing Lab
Requirement for creating a Penetration Testing Lab
 
Review of network diagram
Review of network diagramReview of network diagram
Review of network diagram
 
Review of network diagram
Review of network diagramReview of network diagram
Review of network diagram
 
OSI Layered based attacks
OSI Layered based attacksOSI Layered based attacks
OSI Layered based attacks
 
Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015Final Year Projects Computer Science (Information security) -2015
Final Year Projects Computer Science (Information security) -2015
 
Data calling from web to C#
Data calling from web to C#Data calling from web to C#
Data calling from web to C#
 
Android 2.0 - 4.0 HTML Vulnerable
Android 2.0 - 4.0 HTML Vulnerable Android 2.0 - 4.0 HTML Vulnerable
Android 2.0 - 4.0 HTML Vulnerable
 
Data Hiding (An Approach towards Stegnography)
Data Hiding (An Approach towards Stegnography) Data Hiding (An Approach towards Stegnography)
Data Hiding (An Approach towards Stegnography)
 
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali JafriFinal Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali Jafri
 
Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7
Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7
Syed Ubaid Ali Jafri - Secure IIS Configuration Windows 7
 
Syed Ubaid Ali Jafri - Cryptography Techniques
Syed Ubaid Ali Jafri - Cryptography TechniquesSyed Ubaid Ali Jafri - Cryptography Techniques
Syed Ubaid Ali Jafri - Cryptography Techniques
 
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for AssociatesSyed Ubaid Ali Jafri - Black Box Penetration testing for Associates
Syed Ubaid Ali Jafri - Black Box Penetration testing for Associates
 
Syed Ubaid Ali Jafri Lecture on Information Technology
Syed Ubaid Ali Jafri Lecture on Information Technology Syed Ubaid Ali Jafri Lecture on Information Technology
Syed Ubaid Ali Jafri Lecture on Information Technology
 
Storage area network
Storage area networkStorage area network
Storage area network
 
Securing wireless network
Securing wireless networkSecuring wireless network
Securing wireless network
 
IP Security over VPN
IP Security over VPNIP Security over VPN
IP Security over VPN
 
Network security over ethernet
Network security over ethernetNetwork security over ethernet
Network security over ethernet
 
LAN Security
LAN Security LAN Security
LAN Security
 

Dernier

Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammam
Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in DammamAbortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammam
Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammamahmedjiabur940
 
Guwahati Escorts Service Girl ^ 9332606886, WhatsApp Anytime Guwahati
Guwahati Escorts Service Girl ^ 9332606886, WhatsApp Anytime GuwahatiGuwahati Escorts Service Girl ^ 9332606886, WhatsApp Anytime Guwahati
Guwahati Escorts Service Girl ^ 9332606886, WhatsApp Anytime Guwahatimeghakumariji156
 
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证wpkuukw
 
Point of Care Testing in clinical laboratory
Point of Care Testing in clinical laboratoryPoint of Care Testing in clinical laboratory
Point of Care Testing in clinical laboratoryoyebolasonuga14
 
CRISIS COMMUNICATION presentation=-Rishabh(11195)-group ppt (4).pptx
CRISIS COMMUNICATION presentation=-Rishabh(11195)-group ppt (4).pptxCRISIS COMMUNICATION presentation=-Rishabh(11195)-group ppt (4).pptx
CRISIS COMMUNICATION presentation=-Rishabh(11195)-group ppt (4).pptxRishabh332761
 
一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证
一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证
一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证wpkuukw
 
一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证
一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证
一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证wpkuukw
 
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理uodye
 
怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证
怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证
怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证ehyxf
 
Hilti's Latest Battery - Hire Depot.pptx
Hilti's Latest Battery - Hire Depot.pptxHilti's Latest Battery - Hire Depot.pptx
Hilti's Latest Battery - Hire Depot.pptxhiredepot6
 
在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一
在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一
在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一ougvy
 
在线办理(scu毕业证)南十字星大学毕业证电子版学位证书注册证明信
在线办理(scu毕业证)南十字星大学毕业证电子版学位证书注册证明信在线办理(scu毕业证)南十字星大学毕业证电子版学位证书注册证明信
在线办理(scu毕业证)南十字星大学毕业证电子版学位证书注册证明信oopacde
 
在线制作(UQ毕业证书)昆士兰大学毕业证成绩单原版一比一
在线制作(UQ毕业证书)昆士兰大学毕业证成绩单原版一比一在线制作(UQ毕业证书)昆士兰大学毕业证成绩单原版一比一
在线制作(UQ毕业证书)昆士兰大学毕业证成绩单原版一比一uodye
 
怎样办理阿德莱德大学毕业证(Adelaide毕业证书)成绩单留信认证
怎样办理阿德莱德大学毕业证(Adelaide毕业证书)成绩单留信认证怎样办理阿德莱德大学毕业证(Adelaide毕业证书)成绩单留信认证
怎样办理阿德莱德大学毕业证(Adelaide毕业证书)成绩单留信认证ehyxf
 
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证tufbav
 
Top profile Call Girls In Ratlam [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Ratlam [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Ratlam [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Ratlam [ 7014168258 ] Call Me For Genuine Models We...nirzagarg
 
Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...gajnagarg
 
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制uodye
 
Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...
Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...
Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...Priya Reddy
 

Dernier (20)

In Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pills
In Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pillsIn Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pills
In Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pills
 
Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammam
Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in DammamAbortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammam
Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammam
 
Guwahati Escorts Service Girl ^ 9332606886, WhatsApp Anytime Guwahati
Guwahati Escorts Service Girl ^ 9332606886, WhatsApp Anytime GuwahatiGuwahati Escorts Service Girl ^ 9332606886, WhatsApp Anytime Guwahati
Guwahati Escorts Service Girl ^ 9332606886, WhatsApp Anytime Guwahati
 
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
一比一定(购)新西兰林肯大学毕业证(Lincoln毕业证)成绩单学位证
 
Point of Care Testing in clinical laboratory
Point of Care Testing in clinical laboratoryPoint of Care Testing in clinical laboratory
Point of Care Testing in clinical laboratory
 
CRISIS COMMUNICATION presentation=-Rishabh(11195)-group ppt (4).pptx
CRISIS COMMUNICATION presentation=-Rishabh(11195)-group ppt (4).pptxCRISIS COMMUNICATION presentation=-Rishabh(11195)-group ppt (4).pptx
CRISIS COMMUNICATION presentation=-Rishabh(11195)-group ppt (4).pptx
 
一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证
一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证
一比一定(购)UNITEC理工学院毕业证(UNITEC毕业证)成绩单学位证
 
一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证
一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证
一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证
 
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
一比一原版(USYD毕业证书)澳洲悉尼大学毕业证如何办理
 
怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证
怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证
怎样办理昆士兰大学毕业证(UQ毕业证书)成绩单留信认证
 
Hilti's Latest Battery - Hire Depot.pptx
Hilti's Latest Battery - Hire Depot.pptxHilti's Latest Battery - Hire Depot.pptx
Hilti's Latest Battery - Hire Depot.pptx
 
在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一
在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一
在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一
 
在线办理(scu毕业证)南十字星大学毕业证电子版学位证书注册证明信
在线办理(scu毕业证)南十字星大学毕业证电子版学位证书注册证明信在线办理(scu毕业证)南十字星大学毕业证电子版学位证书注册证明信
在线办理(scu毕业证)南十字星大学毕业证电子版学位证书注册证明信
 
在线制作(UQ毕业证书)昆士兰大学毕业证成绩单原版一比一
在线制作(UQ毕业证书)昆士兰大学毕业证成绩单原版一比一在线制作(UQ毕业证书)昆士兰大学毕业证成绩单原版一比一
在线制作(UQ毕业证书)昆士兰大学毕业证成绩单原版一比一
 
怎样办理阿德莱德大学毕业证(Adelaide毕业证书)成绩单留信认证
怎样办理阿德莱德大学毕业证(Adelaide毕业证书)成绩单留信认证怎样办理阿德莱德大学毕业证(Adelaide毕业证书)成绩单留信认证
怎样办理阿德莱德大学毕业证(Adelaide毕业证书)成绩单留信认证
 
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
 
Top profile Call Girls In Ratlam [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Ratlam [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Ratlam [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Ratlam [ 7014168258 ] Call Me For Genuine Models We...
 
Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In Palghar [ 7014168258 ] Call Me For Genuine Models W...
 
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制
 
Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...
Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...
Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...
 

Securing PoS Terminal - A Technical Guideline on Securing PoS System From Hackers

  • 1. 1 TECHNICAL GUIDELINES ON How to Secure a POS System from Hackers By: Syed Ubaid Ali Jafri Information Security Professional LinkedIn: https://pk.linkedin.com/in/ubaidjafri
  • 2. 2 Contents Background..............................................................................................................................................................................................................3 Objective..................................................................................................................................................................................................................3 Testing Type .............................................................................................................................................................................................................3 TOP 15 Controls Checklist..........................................................................................................................................................................................4 POS Checklist............................................................................................................................................................................................................7 References................................................................................................................................................................................................................8
  • 3. 3 Background The payment terminals we are talking about are tamper proof. They usually have Ethernet connectivity, and a serial line. The interface open to normal user is the card slot and PIN pad, and in some occasions contactless reader. The actual configuration does vary between models and vendors, but the basic idea is that the terminal initiates all the connections and doesn't listen to anything incoming. Objective Our objective for publishing this document is to ensure technically that the initial security up to a level where POS should be secure from basic attacks. Testing Type This testing involves the Physical layer to Presentation Layer testing which includes the following controls but not limited to S.No Control Name 1 Insecure Physical Connectivity 2 IP/MAC Address Spoofing 3 Weak or Default credentials on Device 4 Insecure Communication Protocol 5 Unencrypted Data Travelling 6 Insecure Data Storage 7 Sensitive Information Disclosure 8 Shared File Enumeration 9 Stress testing of PoS Machine 10 Inadequate Transaction Handling 11 Un-necessary services/Ports open 12 Absence of Audit Logging 13 Missing Patches 14 SNMP public community string 15 SSL/TLS Configuration Weaknesses
  • 4. 4 TOP 15 Controls Checklist Summary Sheet of Controls S. No Control Name Control Description Severity Impact 1 Physical Connectivity of PoS The Network connectivity of of PoS device whether the device is connected with Wireless Router or with LAN Switch. Ensure that no other user is able to connect to the same Wifi or LAN Network High An attacker or malicious user with local network access is able to plug their infected machine with the network connected to a PoS system, An attacker would be able to sniff or capture the data on the network. An attacker can easily perform a MiTM attack against this connectivity, 2 IP/MAC Address Spoofing A network attacker can use a protocol analyzer to know a valid MAC address, By examining the MAC Address, An Attacker is able to spoofed the IP/MAC Address of the POS Machine High An attacker can easily steal the identity of the device, an attacker can perform the malicious activity by showing the legitimate device identity which doesn’t belong to them. 3 Weak or Default credentials on Device Device is using the default username or password for hardware administration High An attacker or malicious user is able to perform modification by using the default credentials on device, an attacker is able to change or modify the hardware configurations on device. 4 Insecure Communication Protocol Device is using the weak protocols (FTP, Telnet, VNC, RDP) for remote administration which could lead towards confidentiality, intigrity , availability attack High An attacker or malicious user, with local network access, is able to perform a Man- in-the-Middle attack (MITM) and can see all communication between the POS and the FTP server on the. Using a username and password obtained by passively sniffing traffic on the network, the attacker can connect to the FTP server, download, modify, and then upload arbitrary files 5 Unencrypted Data Travelling Device is able to send data unencrypted on Wifi/LAN channel High An Attacker or malicious user, with local network access, is able to perform a sniffing attack on Wi-Fi/LAN Network. Capturing the unencrypted traffic contains the sensitive information of (Usernames, Password, accounts information)
  • 5. 5 6 Insecure Data Storage Device is able to store the data on Memory card or in the device itself High An attacker is able to copy all the stored data on the machine or in the memory card, which could help an attacker to generate the fake card of original values stored in the device or memory card, by using different strip card reader writer machines. 7 Sensitive Information Disclosure Device is capable to exposing the sensitive data which contains (Track 1 record, Track 2 record and CVV Number of customer High An attacker is able to read or sniff the Track-1, Track-2 Data of customer which could impact towards fake card generation or online sale purchasing of goods. 8 Shared File Enumeration Device has multiple open folders that are shared and has access to the root directory directly High This may directly lead to system compromise by allowing modification of system files. 9 Stress Testing of Pos Terminal The device is not capable for handling huge load on the network, the devices is able to randomly shut down and restart ports on the network switches/routers that connect the servers (via SNMP commands for example), double the baseline number for concurrent users/HTTP connections High An attacker using less skills can perform the attacker on the system which could lead towards availability attack. 10 Inadequate Transaction Handling An attacker is able to retrieve the configuration information from the Server, the authentication takes place in plaintext over the local network, and all the transactions are shown in plaintext in the text file. High An attacker can perform the Man-in-the- Middle attack and can change the price value, modify the items and their date. 11 Un-necessary services/Ports open There are multiple ports that are open and not being used on the device Medium By using unused port an attacker can perform a brute force attack or sending the SYN request to the terminal machine which could lead towards availability attack.
  • 6. 6 12 Absence of Audit Logging Device is not able to record the logs of (Logged in, Transactions, Network Connectivity) Medium Due to absence of Audit Logging, An attacker can easily perform malicious activities and hide their tracks. 13 Missing Patches Critical Microsoft security patches were not installed on the PoS Sytem. The missing patches address vulnerabilities which may allow unauthenticated remote code execution, privilege escalation, denial of service, and confidential information disclosure Medium An attacker or malicious user with network access may be able to view sensitive information, cause Denial-of- Service, or execute arbitrary code. An attacker with local access to the hosts may be able to escalate their privileges up to the administrator level. 14 SNMP public community string Simple Network Management Protocol (SNMP) community string ‘public’ is used on the PoS Machine, granting READ-ONLY access to information on remote hosts. SNMP is generally used for system and network monitoring purposes. Typically, a remote network management server queries a remote SNMP agent (residing on the target system) for system status, by supplying a community string for authentication. Medium An attacker or malicious user is able to use the default SNMP community string to discover detailed device metadata and network configuration details, which can assist in other attacks. The information disclosed includes the operating system version, a list of users on the system, a list of installed software, any enabled network interfaces, routing information, as well as any open TCP connections. 15 SSL/TLS Configuration Weaknesses Secure Sockets Layer (SSL) and Transport Layer Security (TLS) are used in the POS environment to protect the confidentiality and integrity of connections to database servers, and to the administrative web interface of the site router. We identified the following misconfigurations with the implementation of SSL/TLS. Medium An attacker or malicious user with network access is able to impersonate SSL/TLS-protected services, or carry out Man-in-The-Middle attacks, compromising the confidentiality and integrity of encrypted network communications. These communications may include sensitive business information such as transactions and payment data, as well as technical information such as credentials or configuration files
  • 7. 7 POS Checklist A pointof sales(POS) systems needsassessmentisessential forplanningthe selectionand deploymentof pointof salessystem. Thischecklistwillassist indefiningsystemrequirementsandwill also provide the foundationforVulnerabilitywhichcouldbe foundinthe control,the riskassociatedwiththe vulnerability,itsimpactanalysis,anditstechnical recommendationswhichincludes(Configurational changes,Proceduralchanges,Software/Services changesetc.) PoS (Point of Sale ) Information Security Checklist S. No Control Name Control Presence Risk Description Impact Severity Recommendation 1  2  3  4 5 
  • 8. 8 References 1 http://www.internetsociety.org/doc/addressing-challenge-ip-spoofing 2 http://www.guru99.com/testing-for-retail-pos-point-of-sale-system.html 3 https://community.hpe.com/t5/Security-Research/Hacking-POS-Terminal-for-Fun-and-Non-profit/ba-p/6540620#.WEfkGNV97IU 4 http://www.pcworld.com/article/259882/vulnerabilities_in_payment_terminals_demonstrated_at_black_hat.html 5 https://pen-testing.sans.org/blog/2014/06/12/pen-testing-payment-terminals-a-step-by-step-how-to-guide 6 http://www.slideshare.net/evilhackerz/penetration-testing-guidancemarch2015