SMS-Ticket-Vortrag: Unterschied zwischen den Versionen

aus Metalab, dem offenen Zentrum für meta-disziplinäre Magier und technisch-kreative Enthusiasten.
Wechseln zu: Navigation, Suche
(Datum fix, 5. Mai 2009 + Abstracts + Vortragender + Ankündigung)
K (SMS-Ticket Vortrag)
Zeile 7: Zeile 7:
<div style="font-size:larger;">The Metalab warmly invites to a talk from
<div style="font-size:larger;">The Metalab warmly invites to
[[User:Wilder|Pavol Luptak]] about SMS-Ticket hacking.</div>
[[User:Wilder|Pavol Luptak's]] talk about SMS-Ticket hacking.</div>
: on '''Tuesday''', '''May 5th''' 2009, 20:00h<br />
: on '''Tuesday''', '''May 5th''' 2009, 20:00h<br />
: in the Metalab, [[Lage|Rathausstrasse 6]], 1010 Wien
: in the Metalab, [[Lage|Rathausstrasse 6]], 1010 Wien

Version vom 29. April 2009, 23:19 Uhr

SMS-Ticket Vortrag

Das Metalab lädt herzlich zum Vortrag von Pavol Luptak über SMS-Ticket Hacking ein.
am Dienstag, den 5. Mai 2009, 20:00h
im Metalab, Rathausstrasse 6, 1010 Wien

The Metalab warmly invites to Pavol Luptak's talk about SMS-Ticket hacking.
on Tuesday, May 5th 2009, 20:00h
in the Metalab, Rathausstrasse 6, 1010 Wien


The primary aim of this presentation is to show a serious inherentvulnerability in the public transport SMS tickets system widely used in many big cities. Firstly, prerequisites for a successful hack are described. Then a proposed SMS ticket hacking network architecture is outlined, including a SMS ticket hack server, SMS ticket mobile hack clients and their encrypted communication protocol. The author describes various partial solutions how to fix this vulnerability including instructions for attackers how to evade them (e.g. by using decentralized private P2P mobile network). Finally, an effective countermeasure is proposed: secure SMS ticket generation methods based on symmetric/asymmetric cryptography and a security improvement of transport inspector’s checking process. Despite the fact that public transport companies have already been informed about this serious vulnerability, they ignore this fact and still use the vulnerable systems.

More about the Speaker

Pavol's CV