SlideShare une entreprise Scribd logo
1  sur  22
$NATCH
Sergey Scherbel & Yuriy Dyachenko
Positive Technologies
Positive Hack Days 2013
Some Background
The competition took place for the first time at PHDays 2012.
$natch aims at demonstrating the typical vulnerabilities of
online banking systems.
Positive Technologies performs security tests of online banking
systems on a regular basis. We are really into it.
The most interesting and dangerous vulnerabilities along with
the simply typical weaknesses are integrated into PHDays
iBank.
Last Year Results
― 9 participants;
― 4 winners;
― the biggest winnings of 3,500
roubles;
― some winners got into the Positive
community 
;
(after an extremely scary
interview of course).
PHDays iBank 2
PHDays iBank 2 is NOT a real online banking system used by
actual banks.
The system was developed exclusively for the PHDays 2013
competition.
PHDays iBank 2 employs the typical vulnerabilities of online
banking systems.
Competition Rules
― 100 bank clients;
― 10 participants;
― 20,000 roubles of prize money;
― 1 day for source code analysis;
― 30–40 minutes of the actual competition;
― a participant will get as much money as he/she will manage
to transfer to his/her account;
― the participants can steal money from each other.
At Workshop
You will be able:
― to examine each vulnerability in detail;
― to exploit vulnerabilities “by hand”;
― to exploit vulnerabilities with various tools.
Everything is performed on a special copy of the competition
system.
Accounts
100001:PKAC1y
100002:RNrlO9
100003:Ndl1Ix
100004:hQPuJw
100005:kpgtCI
Authentication
One should enter the CAPTCHA to sign in.
Mobile Bank Authentication
No CAPTCHA here, thus the account bruteforce is possible.
Accounts with Simple Passwords
100011:password
100012:phdays
100013:qwerty
100014:password
100015:123456
100016:12345
100017:11111
100018:ninja
100019:123123
100020:sex
100021:asdzxc
100022:654321
100023:iloveyou
100024:root
100025:master
100026:superman
...
Transaction Confirmation
Confirmation Bypass in Mobile Bank
Payment Templates Modification
Payment Templates Modification
A template is not checked if it is owned by the current user
Payment Templates Modification
$$
Payment Templates Modification
$$
Importing Contacts
Most online banks have a feature that allows one to import/export
data.
XML External Entity
Loading of external entities is not disabled.
http://php.net/libxml_disable_entity_loader
XML External Entity
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE contact [<!ENTITY x SYSTEM "php://filter/read=convert.base64-
encode/resource=logs/changePassword.log">]>
<contacts>
<contact>
<name>name</name>
<account>90107430600712500003</account>
<description>&x;</description>
</contact>
</contacts>
http://www.php.net/manual/en/wrappers.php.php
XML External Entity
File contents in base64
Debug Mode
Thanks for your attention!
Sergey Scherbel
sscherbel@ptsecurity.ru
Yuriy Dyachenko
ydyachenko@ptsecurity.ru

Contenu connexe

Similaire à Sergey Scherbel, Yuriy Dyachenko. Analyzing $natch

Fintech Belgium Summit 2018: Open Banking - Klarna by Aoife Houlihan
 Fintech Belgium Summit 2018: Open Banking - Klarna by Aoife Houlihan Fintech Belgium Summit 2018: Open Banking - Klarna by Aoife Houlihan
Fintech Belgium Summit 2018: Open Banking - Klarna by Aoife Houlihan
FinTech Belgium
 
Typical Vulnerabilities of E-Banking Systems
Typical Vulnerabilities of E-Banking SystemsTypical Vulnerabilities of E-Banking Systems
Typical Vulnerabilities of E-Banking Systems
Positive Hack Days
 

Similaire à Sergey Scherbel, Yuriy Dyachenko. Analyzing $natch (20)

apidays LIVE Paris - Microservices, up and running by Irakli Nadareishvili
apidays LIVE Paris - Microservices, up and running by Irakli Nadareishviliapidays LIVE Paris - Microservices, up and running by Irakli Nadareishvili
apidays LIVE Paris - Microservices, up and running by Irakli Nadareishvili
 
Fintech Belgium Summit 2018: Open Banking - Klarna by Aoife Houlihan
 Fintech Belgium Summit 2018: Open Banking - Klarna by Aoife Houlihan Fintech Belgium Summit 2018: Open Banking - Klarna by Aoife Houlihan
Fintech Belgium Summit 2018: Open Banking - Klarna by Aoife Houlihan
 
APIDays 2020 - SEED(S) API Design Methodology
APIDays 2020 - SEED(S) API Design MethodologyAPIDays 2020 - SEED(S) API Design Methodology
APIDays 2020 - SEED(S) API Design Methodology
 
Risk Beyond Acquiring: Merchant Risk Across FinTech
Risk Beyond Acquiring: Merchant Risk Across FinTechRisk Beyond Acquiring: Merchant Risk Across FinTech
Risk Beyond Acquiring: Merchant Risk Across FinTech
 
Everything You Need to Know About Crypto
Everything You Need to Know About CryptoEverything You Need to Know About Crypto
Everything You Need to Know About Crypto
 
Webcast - how can banks defend against fraud?
Webcast - how can banks defend against fraud?Webcast - how can banks defend against fraud?
Webcast - how can banks defend against fraud?
 
Digital Transformation Fighting Banking Fraud: Money 2.0 Conference’s Experts...
Digital Transformation Fighting Banking Fraud: Money 2.0 Conference’s Experts...Digital Transformation Fighting Banking Fraud: Money 2.0 Conference’s Experts...
Digital Transformation Fighting Banking Fraud: Money 2.0 Conference’s Experts...
 
Building Intelligent Data Products (Applied AI)
Building Intelligent Data Products (Applied AI)Building Intelligent Data Products (Applied AI)
Building Intelligent Data Products (Applied AI)
 
A Research Paper on Credit Card Fraud Detection
A Research Paper on Credit Card Fraud DetectionA Research Paper on Credit Card Fraud Detection
A Research Paper on Credit Card Fraud Detection
 
Digits ico-whitepaper-1v8c
Digits ico-whitepaper-1v8cDigits ico-whitepaper-1v8c
Digits ico-whitepaper-1v8c
 
Typical Vulnerabilities of E-Banking Systems
Typical Vulnerabilities of E-Banking SystemsTypical Vulnerabilities of E-Banking Systems
Typical Vulnerabilities of E-Banking Systems
 
W12 pitch deck v11.1
W12 pitch deck   v11.1W12 pitch deck   v11.1
W12 pitch deck v11.1
 
Presentation for 2012 nextMedia in Toronto, Canada
Presentation for 2012 nextMedia in Toronto, CanadaPresentation for 2012 nextMedia in Toronto, Canada
Presentation for 2012 nextMedia in Toronto, Canada
 
moncon - The World's Simplest Paywall
moncon - The World's Simplest Paywallmoncon - The World's Simplest Paywall
moncon - The World's Simplest Paywall
 
Fraud Meetup
Fraud MeetupFraud Meetup
Fraud Meetup
 
python pre-submission report.pdf
python pre-submission report.pdfpython pre-submission report.pdf
python pre-submission report.pdf
 
TADHack Global 2019 Winners
TADHack Global 2019 WinnersTADHack Global 2019 Winners
TADHack Global 2019 Winners
 
APIdays London 2019 - Open Banking:The day after PSD2 by Emmanuel Methivier, ...
APIdays London 2019 - Open Banking:The day after PSD2 by Emmanuel Methivier, ...APIdays London 2019 - Open Banking:The day after PSD2 by Emmanuel Methivier, ...
APIdays London 2019 - Open Banking:The day after PSD2 by Emmanuel Methivier, ...
 
New Technology To Combat The Fraud In Fintech: Rescue Tactics For Neobanks | ...
New Technology To Combat The Fraud In Fintech: Rescue Tactics For Neobanks | ...New Technology To Combat The Fraud In Fintech: Rescue Tactics For Neobanks | ...
New Technology To Combat The Fraud In Fintech: Rescue Tactics For Neobanks | ...
 
Fingerprint Authentication for ATM
Fingerprint Authentication for ATMFingerprint Authentication for ATM
Fingerprint Authentication for ATM
 

Plus de Positive Hack Days

Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»
Positive Hack Days
 
Эвристические методы защиты приложений
Эвристические методы защиты приложенийЭвристические методы защиты приложений
Эвристические методы защиты приложений
Positive Hack Days
 
Уязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на граблиУязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на грабли
Positive Hack Days
 
Механизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET CoreМеханизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET Core
Positive Hack Days
 

Plus de Positive Hack Days (20)

Инструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release NotesИнструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release Notes
 
Как мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows DockerКак мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows Docker
 
Типовая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive TechnologiesТиповая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive Technologies
 
Аналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + QlikАналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + Qlik
 
Использование анализатора кода SonarQube
Использование анализатора кода SonarQubeИспользование анализатора кода SonarQube
Использование анализатора кода SonarQube
 
Развитие сообщества Open DevOps Community
Развитие сообщества Open DevOps CommunityРазвитие сообщества Open DevOps Community
Развитие сообщества Open DevOps Community
 
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
 
Автоматизация построения правил для Approof
Автоматизация построения правил для ApproofАвтоматизация построения правил для Approof
Автоматизация построения правил для Approof
 
Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»
 
Формальные методы защиты приложений
Формальные методы защиты приложенийФормальные методы защиты приложений
Формальные методы защиты приложений
 
Эвристические методы защиты приложений
Эвристические методы защиты приложенийЭвристические методы защиты приложений
Эвристические методы защиты приложений
 
Теоретические основы Application Security
Теоретические основы Application SecurityТеоретические основы Application Security
Теоретические основы Application Security
 
От экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 летОт экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 лет
 
Уязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на граблиУязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на грабли
 
Требования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПОТребования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПО
 
Формальная верификация кода на языке Си
Формальная верификация кода на языке СиФормальная верификация кода на языке Си
Формальная верификация кода на языке Си
 
Механизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET CoreМеханизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET Core
 
SOC для КИИ: израильский опыт
SOC для КИИ: израильский опытSOC для КИИ: израильский опыт
SOC для КИИ: израильский опыт
 
Honeywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services CenterHoneywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services Center
 
Credential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атакиCredential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атаки
 

Dernier

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Dernier (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Sergey Scherbel, Yuriy Dyachenko. Analyzing $natch