SMS-Ticket-Vortrag: Unterschied zwischen den Versionen

aus Metalab, dem offenen Zentrum für meta-disziplinäre Magier und technisch-kreative Enthusiasten.
Wechseln zu: Navigation, Suche
K (SMS-Ticket Vortrag)
K (+kat)
 
(Eine dazwischenliegende Version von einem anderen Benutzer werden nicht angezeigt)
Zeile 1: Zeile 1:
=SMS-Ticket Vortrag=
 
 
 
<div style="font-size:larger;">Das Metalab lädt herzlich zum Vortrag von  
 
<div style="font-size:larger;">Das Metalab lädt herzlich zum Vortrag von  
 
[[User:Wilder|Pavol Luptak]] über SMS-Ticket Hacking ein.</div>
 
[[User:Wilder|Pavol Luptak]] über SMS-Ticket Hacking ein.</div>
Zeile 13: Zeile 11:
  
  
<b>Abstract</b>
+
=== Abstract ===
 +
 
 +
<cite>The primary aim of this presentation is to show a serious inherent vulnerability in the public transport SMS tickets system widely used in many big cities. Firstly, prerequisites for a successful hack are described. Then a proposed SMS ticket hacking network architecture is outlined, including a SMS ticket hack server, SMS ticket mobile hack clients and their encrypted communication protocol. The author describes various partial solutions how to fix this vulnerability including instructions for attackers how to evade them (e.g. by using decentralized private P2P mobile network). Finally, an effective countermeasure is proposed: secure SMS ticket generation methods based on symmetric/asymmetric cryptography and a security improvement of transport inspector’s checking process. Despite the fact that public transport companies have already been informed about this serious vulnerability, they ignore this fact and still use the vulnerable systems.</cite>
 +
 
 +
 
 +
=== More about the Speaker ===
  
<cite>The primary aim of this presentation is to show a serious inherentvulnerability in the public transport SMS tickets system widely used in many big cities. Firstly, prerequisites for a successful hack are described. Then a proposed SMS ticket hacking network architecture is outlined, including a SMS ticket hack server, SMS ticket mobile hack clients and their encrypted communication protocol. The author describes various partial solutions how to fix this vulnerability including instructions for attackers how to evade them (e.g. by using decentralized private P2P mobile network). Finally, an effective countermeasure is proposed: secure SMS ticket generation methods based on symmetric/asymmetric cryptography and a security improvement of transport inspector’s checking process. Despite the fact that public transport companies have already been informed about this serious vulnerability, they ignore this fact and still use the vulnerable systems.</cite>
+
* [http://trip.sk/cv/cv-comprehensive.html Pavol's CV]
  
  
<b>More about the Speaker</b>
 
  
[http://trip.sk/cv/cv-comprehensive.html Pavol's CV]
+
[[Kategorie:Veranstaltungen]]
 +
[[Kategorie:English]]

Aktuelle Version vom 30. April 2009, 06:32 Uhr

Das Metalab lädt herzlich zum Vortrag von Pavol Luptak über SMS-Ticket Hacking ein.
am Dienstag, den 5. Mai 2009, 20:00h
im Metalab, Rathausstrasse 6, 1010 Wien


The Metalab warmly invites to Pavol Luptak's talk about SMS-Ticket hacking.
on Tuesday, May 5th 2009, 20:00h
in the Metalab, Rathausstrasse 6, 1010 Wien


Abstract

The primary aim of this presentation is to show a serious inherent vulnerability in the public transport SMS tickets system widely used in many big cities. Firstly, prerequisites for a successful hack are described. Then a proposed SMS ticket hacking network architecture is outlined, including a SMS ticket hack server, SMS ticket mobile hack clients and their encrypted communication protocol. The author describes various partial solutions how to fix this vulnerability including instructions for attackers how to evade them (e.g. by using decentralized private P2P mobile network). Finally, an effective countermeasure is proposed: secure SMS ticket generation methods based on symmetric/asymmetric cryptography and a security improvement of transport inspector’s checking process. Despite the fact that public transport companies have already been informed about this serious vulnerability, they ignore this fact and still use the vulnerable systems.


More about the Speaker