Upgrade to Pro — share decks privately, control downloads, hide ads and more …

What's in your pocket? (BSides Manchester)

What's in your pocket? (BSides Manchester)

Although we’re starting to see computers built into lightbulbs and refrigerators, we’ve been quietly surrounded by smaller computers all along. SIM cards, modern passports, student cards, transit cards, and access cards contain microprocessors featuring limited storage and cryptographic abilities. This talk explores what data smartcards store and how they protect the stored data.

Harley Watson

August 18, 2016
Tweet

More Decks by Harley Watson

Other Decks in Technology

Transcript

  1. $ whoami • Software Engineering Intern at Judo Payments •

    Second year student at Abertay University (HackSoc Secretary + Securi-Tay 2017 Organiser) • Lived in the Dominican Republic for 13 years • I dig • Payments technologies • Security UX • Embedded devices • Public transportation
  2. Take a look at your wallet • GPG card •

    Bank card • Laundry card • Transit card • Identity documents • Hotel/office key • Student card • Single Sign On card
  3. Take a look at your appliances • Satellite decoder cards

    • SIM cards • Gas/electricity top-up card
  4. We directly interact with the data held on magnetic stripe

    cards http://samy.pl/magspoof/iron-oxide-short-low.gif
  5. or

  6. Contactless cards are defined by ISO/IEC 14443 (Uses ISO/IEC 7816’s

    T=1 protocol) (so it’s sorta the same, but more interference)
  7. 3B 88 80 01 E1 F3 5E 11 77 83

    B7 00 17 https://smartcard-atr.appspot.com/
  8. 3B 88 80 01 E1 F3 5E 11 77 83

    B7 00 17 (UK Biometric Residence Permit)
  9. 3B 88 80 01 00 00 00 00 80 81

    71 00 79 Apple Pay 3B 81 80 01 80 Oyster Card / MIFARE DESFire 3B 8F 80 01 80 4F 0C A0 00 00 03 06 03 00 02 00 00 00 00 69 Scottish National Entitlement Card / MIFARE Classic 4k 3B 89 80 01 66 52 57 45 32 50 52 4F 4D 1C Glasgow Subway Card / ITSO
  10. Applications usually implement a handful of standard commands • READ

    BINARY • WRITE BINARY • UPDATE BINARY • ERASE BINARY • READ RECORD • WRITE RECORD • APPEND RECORD • UPDATE RECORD • GET DATA • PUT DATA • SELECT FILE • VERIFY
  11. Multiple applications per card are used in the United States

    to allow debit cards to be run in stores over the credit network or the debit network. * Supporting this is legally required as a result of the Durbin Amendment