{"id":10602,"date":"2018-03-20T18:59:08","date_gmt":"2018-03-20T14:59:08","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/small-hacks-sas2018\/10602\/"},"modified":"2019-11-15T15:23:17","modified_gmt":"2019-11-15T11:23:17","slug":"small-hacks-sas2018","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/small-hacks-sas2018\/10602\/","title":{"rendered":"Small hacks: Free coffee, spying taxis, and a vulnerable airport"},"content":{"rendered":"<p>News websites often feature stories about computer errors and vulnerabilities used to perpetrate sophisticated large-scale incidents like last year\u2019s <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/wannacry-ransomware\/16518\/\" rel=\"noopener noreferrer nofollow\">WannaCry<\/a> and <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/new-ransomware-epidemics\/17314\/\" rel=\"noopener noreferrer nofollow\">NotPetya<\/a> attacks. But experts know that most successful hacks and cracks are the result of very basic blunders by system developers or installers.<\/p>\n<p>Incorrectly configured systems are everywhere, and only a few hours separate the moment when a hacker first sniffs out such a system and its total surrender to the human intellect. Speaking at the <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/tag\/the-sas-2018\/\" rel=\"noopener noreferrer nofollow\">Security Analyst Summit 2018<\/a>, Israeli researcher Inbar Raz gave a host of examples confirming this sad fact.<\/p>\n<h2>Free coffee<\/h2>\n<p>Many coffee shop loyalty cards work as follows: the customer receives a card, tops it up like a bank card, and then uses it to pay in the caf\u00e9, earning bonuses for large or frequent purchases. The customer can check the balance on the coffee chain\u2019s website by entering the card number.<\/p>\n<p>Having got hold of such a card for himself, Inbar Raz noted that the website lets users check cards with any number as many times as they like. So, using a tiny program that took him half an hour to write, Raz went through a bunch of different card numbers and identified ones that were topped up with plenty of cash.<\/p>\n<p>Next, after reading the magnetic strip of his card with a cheap USB reader, Raz found that the number had been written to the card in unencrypted form, and the only security was a control bit that was quite easy to compute. The task of replacing the number on the card\u2019s mag stripe with one of the numbers found in the previous step and using someone else\u2019s funds was child\u2019s play.<\/p>\n<p>Ethically minded, Raz proved the concept in practice by buying another card, topping it up, and writing its number to the first card. It worked. In theory, an eagle-eyed caf\u00e9 employee could still spot the deception by comparing the number printed on the card with the one on the receipt. But in practice, that ain\u2019t gonna happen. So, it\u2019s basically unlimited free coffee for the hacker \u2014 and perhaps a muffin for good measure.<\/p>\n<h2>Uber-style tracking<\/h2>\n<p>A while back, Uber was hit by a <a target=\"_blank\" href=\"http:\/\/www.businessinsider.com\/uber-employees-stalked-celebrities-ex-employee-claims-2016-12\" rel=\"noopener noreferrer nofollow\">scandal<\/a> involving claims that employees had misused the mobile app to track high-profile passengers.<\/p>\n<p>It turns out that other taxi services let you do it without the hassle of having to work for them. Inbar Raz discovered that when a taxi is booked online, its status can be tracked using the contact phone number \u2014 and as in the free coffee case, there is no protection against brute-force searches.<\/p>\n<p>He wrote a small number-busting program and ended up with a handy map indicating the addresses of <em><em>all<\/em><\/em> recent taxi orders for this service.<a target=\"_blank\" href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2018\/03\/20185926\/small-hacks-sas2018-taxi-map.jpg\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-10605\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2018\/03\/20185926\/small-hacks-sas2018-taxi-map-1024x655.jpg\" alt=\"\" width=\"1024\" height=\"655\"><\/a><\/p>\n<h2>Airport (in)security<\/h2>\n<p>Standard free Wi-Fi sometimes harbors hidden surprises. In the business lounge of one East European airport, Inbar Raz decided to check out the configuration of the local access point.<\/p>\n<p>The router settings, he found, could be opened at the standard Web address with no need for an administrator password. Having studied the settings, Raz realized it wasn\u2019t simply a guest access point, but the airport\u2019s main router with vital dispatch and security systems hooked up to it. These services could be disabled by anyone with a laptop or even a smartphone.<a target=\"_blank\" href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2018\/03\/20185936\/small-hacks-sas2018-airport-vlans.jpg\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-10607\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2018\/03\/20185936\/small-hacks-sas2018-airport-vlans-1024x822.jpg\" alt=\"\" width=\"1024\" height=\"822\"><\/a><\/p>\n<p>Programmers and system administrators, take heed. Don\u2019t assume that your little caf\u00e9 (or taxi service, or airport) is too niche for hackers. Standard settings, simple passwords like \u201cadmin\u201d or \u201c12345,\u201d and no CAPTCHA or other measures against automated attacks are the most common security faux pas, and the simplest way in for intruders. Even lowly hackers can exploit them. And guys like Inbar Raz \u2014 people who responsibly disclose vulnerabilities to you instead of exploiting them for their own profit \u2014 are few and far between.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>At this year\u2019s Security Analyst Summit, Inbar Raz revealed how he managed to crack a cafe chain\u2019s loyalty card system, a taxi service, and an airport<\/p>\n","protected":false},"author":32,"featured_media":10603,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1486],"tags":[1551,1713,82,337,333,1626,1714],"class_list":{"0":"post-10602","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-thesas2018","9":"tag-ethical-hacking","10":"tag-hacking","11":"tag-sas","12":"tag-security-analyst-summit","13":"tag-the-sas-2018","14":"tag-white-hats"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/small-hacks-sas2018\/10602\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/small-hacks-sas2018\/12792\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/small-hacks-sas2018\/14917\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/small-hacks-sas2018\/13230\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/small-hacks-sas2018\/12672\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/small-hacks-sas2018\/15551\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/small-hacks-sas2018\/15194\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/small-hacks-sas2018\/19912\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/small-hacks-sas2018\/4804\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/small-hacks-sas2018\/21606\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/small-hacks-sas2018\/9097\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/small-hacks-sas2018\/16130\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/small-hacks-sas2018\/9454\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/small-hacks-sas2018\/19896\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/small-hacks-sas2018\/19833\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/small-hacks-sas2018\/19853\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/sas\/","name":"SAS"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/10602","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=10602"}],"version-history":[{"count":4,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/10602\/revisions"}],"predecessor-version":[{"id":14730,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/10602\/revisions\/14730"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/10603"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=10602"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=10602"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=10602"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}