Take a look at weaknesses in Point of sale systems and the foundation of hotel key data and the Property management systems that manage the keys. Using a modified MST injection method Weston will demonstrate several attacks on POS and Hotel keys including brute forcing other guest’s keys from your card information as a start point. And methods of injecting keystrokes into POS systems just as if you had a keyboard plugged into the system. This includes injecting keystrokes to open cash drawer...
Topics: Youtube, video, Science & Technology, def con, defcon, DEF CON 24, Dc24, DC 24, DC-24, weston...
In This Episode: Blue Origin successfully test-launches -- and lands -- their New Shepherd rocket and human-capable capsule. The latest Breach of the Week should have Bezop cryptocurrency investors on guard (and any site using the Mongo data base). Millions of hotel doors may be easily opened by hackers. T-Mobile buys Sprint. This Week's Hosts Randy Cassingham, founder of This is True and the Internet Spam Primer. Leo Notenboom, "Chief Question Answerer," at tech education site Ask...
Topics: 100km space limit, Airline WiFi, Amazon, Apple Pay, Apple Pencil, AT&T cellular, Bezop,...
Source: https://tehpodcast.com/teh-022-mongo-only-pawn-in-game-of-life/