POS system vulnerability analysis

Cloned Boy

Professional
Messages
1,219
Reaction score
966
Points
113
Below is the most detailed, in-depth and educational analysis of POS (Point of Sale) vulnerabilities, aimed at carders. The material covers technical, physical, architectural and process aspects, including real-life examples, testing methods and protection strategies.

πŸ” Deep analysis of POS (Point of Sale) system vulnerabilities​

Educational Guide to Payment Terminal Cybersecurity​


🧩 1. What is a POS system? Classification and architecture​

1.1 Definition​

POS (Point of Sale) is a system designed to process financial transactions in retail, restaurants, transport and other areas. It includes hardware, software and network support that interacts with banking payment systems.

1.2. Types of POS systems​

TYPEDESCRIPTIONEXAMPLES
Terminal (Standalone)Standalone devices (Ingenico, Verifone)Move 5000, Vx690
Hybrid (POS + PC)Windows PC + external terminalRestaurants, supermarkets
Mobile (mPOS)Smartphone/tablet + dock readerSumUp, iZettle
Cloud (Cloud POS)Data is stored in the cloudShopify POS, Lightspeed

⚠️ Hybrid and mPOS systems are the most vulnerable, as they use common operating systems (Windows, Android), which are susceptible to malware.

🧱 2. Architecture of a typical POS system​

Code:
[Card] β†’ [Chip/Magnetic Stripe]
↓
[POS Terminal/Cash Register Software]
↓
[Encryption (DUKPT, TLS)]
↓
[Processing Center (Acquirer)]
↓
[Issuing Bank]

Key components:​

COMPOTENTFUNCTIONTHREATS
Secure Element (SE)Storing keys, performing cryptographyPhysical access, side-channel attacks
HSM (Hardware Security Module)Generating and protecting keysCompromise due to improper use
EMV readerData exchange with the chipSkimming, MITM at the bus level
Terminal OSProcess managementVulnerabilities, malware
NetData transferInterception, MITM, DoS

⚠️ 3. Why are POS systems a high priority target?​

3.1. What do criminals steal?​

  • PAN (Primary Account Number) β€” card number.
  • Track Data β€” data from the magnetic stripe (Track 1, Track 2).
  • Expiry date, holder's name.
  • In rare cases - partially encrypted PIN.

πŸ’‘ This data is sold on the darknet for $5–$50 per card and is used to:
  • Cloning (magnetic stripe only).
  • Fraudulent online purchases (CNP - Card Not Present).

3.2. Economic motivation​

  • One successful attack can give access to thousands of cards.
  • Example: Target attack (2013) - 40 million cards leaked, damage > $200 million.

πŸ”4. Vulnerability classification (according to OWASP and NIST)​

LEVELVULNERABILITYDESCRIPTION
PhysicalSkimming, TamperingDirect access to the device
ProgramMalware, RCE, backdoorsMalware, exploits
NetworkMITM, Sniffing, Open PortsTraffic interception
ConfigurationWeak passwords, encryption disabledAdministrator errors
ProcessNo updates, third party accessOrganizational miscalculations
ArchitecturalNo segmentation, hybrid systemsSystemic weaknesses

🧱 Part 1: Physical Vulnerabilities​

4.1. Skimming (Reading data)​

How it works:​

  • The attacker installs an external device on the card reader.
  • When you insert a card, the data from the magnetic stripe is copied.
  • A fake keypad or mini camera is often used to collect the PIN.

Types of skimmers:​

TYPEDESCRIPTION
ExternalFits over the original reader
InteriorInstalled inside the case
Deep InsertInserts deep into the slot - almost invisible

πŸ”’ Protection: regular inspection, anti-tamper sensors, RFID tags.

4.2. Tampering (Physical Intervention)​

Objectives:​

  • Access to data buses (UART, SPI, I2C).
  • Connecting to JTAG for memory dump.
  • Extracting Secure Element.

Example of attack:​

  1. Opening the case.
  2. Connecting to UART port.
  3. Reading logs or RAM dump.
  4. Search for keys or PAN.

πŸ” Protection:
  • Anti-tamper sensors (when opened, keys are erased).
  • Tamper-evident chips.
  • Physical blocking of connectors.

πŸ› Part 2: Software Vulnerabilities​

5.1. POS-Malware: how it works​

Attack stages:​

  1. Infection:
    • Via USB flash drive.
    • Via network (eg RDP, SMB).
    • Through software update.
  2. Searching for data in memory (RAM Scrapping):
    • Malware scans RAM for PAN.
    • PAN may be in memory in clear text for milliseconds during processing.
  3. Extraction and transfer:
    • The data is packaged and sent to the C&C server.

Known examples:​

MALWAREPECULIARITIES
BlackPOSAttack on Target, used RAM-scraping
NightTraffic encryption, stealth
NewPosThingsActive in Asia, uses DLL injections

πŸ“Œ PAN is not stored on disk, but is temporarily stored in RAM - this is enough.

5.2. Vulnerabilities in software and firmware​

Common problems:​

  • Hardcode keys in firmware.
  • Unsecured APIs for integration.
  • Weak encryption (DES instead of AES).
  • No updates (EOL devices).

CVE examples:​

  • CVE-2020-14528 β€” RCE in Verifone terminals.
  • CVE-2019-3560 - vulnerability in Ingenico Telium.
  • CVE-2018-10873 - Buffer overflow in POS software.

πŸ”Firmware analysis is a key stage of pentesting.

🌐 Part 3: Network Vulnerabilities​

6.1. Traffic interception (Sniffing)​

Conditions:​

  • POS uses Wi-Fi without encryption.
  • TLS is missing or a self-signed certificate is used.

Tools:​

  • Wireshark.
  • tcpdump.
  • Ettercap (for MITM).

πŸ” Solution: mandatory use of TLS 1.2+, certificate validation.

6.2. MITM attacks​

Scenario:​

  1. The attacker replaces the gateway.
  2. Intercepts requests for processing.
  3. May modify the amount or redirect data.

βœ… Protection: HSTS, Certificate Pinning, DANE (DNSSEC + TLSA).

6.3. Open ports and services​

PORTSERVICERISK
21FTPTransferring data without encryption
23TelnetLogin in clear text
139/445SMBEternalBlue Vulnerabilities
3389RDPBrute-force, BlueKeep

πŸ”’ Recommendation: close all unnecessary ports, use a firewall.

βš™οΈ Part 4: Configuration and Process Vulnerabilities​

7.1 Weak Passwords and Accounts​

  • Standard logins: admin:admin, service:1234.
  • No MFA to access settings.

7.2. Manual updates​

  • The devices have not been updated for years.
  • EOL (End of Life) models are used.

7.3. Third Party Access​

  • Service engineers can:
    • Install malware.
    • Copy configurations.
    • Connect to the terminal via USB.

βœ… Solution: logging of all actions, restriction of rights, access audit.

πŸ—οΈ Part 5: Architectural Vulnerabilities​

8.1. Hybrid systems (POS + PC)​

Problem:​

  • Card β†’ terminal β†’ data is transferred to PC β†’ sent to processing.
  • If the PC is infected, the data is intercepted before encryption.

πŸ”’ Solution: End-to-End Encryption (E2EE), Point-to-Point Encryption (P2PE).

8.2 No network segmentation​

Risks:​

  • Compromise of office PC β†’ access to POS network.
  • Distribution of ransomware.

βœ… Solution:
  • VLAN for POS.
  • Separate firewall.
  • Prohibition of access from POS to the Internet (only via proxy).

πŸ›‘οΈ Part 6: Standards and Regulations​

9.1. PCI DSS v4.0 (2022)​

12 requirements including:
  • Req 3: Data storage protection (no PAN).
  • Req 4: Data transmission encryption.
  • Req 6: Software update.
  • Req 11: Vulnerability Scanning.
  • Req 12: Security Policies.

πŸ“Œ Non-compliance - fines up to $500,000/month.

9.2. PCI PTS (PIN Transaction Security)​

Requirements for hardware terminals:
  • Protection from physical access.
  • Secure boot.
  • Cryptographic isolation.
  • Certification of cryptomodules.

πŸ› οΈ Part 7: POS Security Testing Methodology​

Pentest stages:​

1. Intelligence​

  • Definition of terminal models.
  • Analysis of documentation (datasheets, firmware).

2. Network scanning​

Bash:
nmap -sV -p- 192.168.1.0/24

3. Firmware analysis​

  • Extracting an image (via UART, JTAG, SD card).
  • Parsing with Binwalk:
Bash:
binwalk firmware.ist
  • Search for strings, keys, backdoors:
Bash:
strings firmware.bin | grep -i "password\|key"

4. Reverse engineering​

  • Using Ghidra or IDA Pro to analyze code.
  • Vulnerability detection: buffer overflow, insecure crypto.

5. Memory analysis​

  • RAM dump during transaction.
  • Finding PAN using regular expressions:
regex
Code:
^(?:4[0-9]{12}(?:[0-9]{3})?|5[1-5][0-9]{14})$

6. Physical test​

  • Tampering check.
  • Connecting to UART to read logs.

βœ…Part 8: Defense Strategies​

LEVELMEASURE
PhysicalAnti-tamper sensors, cameras, regular audit
NetworkVLAN, firewall, TLS, internet ban
ProgramEDR, antivirus, regular updates
DataP2PE, tokenization, no PAN storage
ProcessesTraining, policies, access audit
MonitoringSIEM, anomaly detection (e.g. many transactions per second)

πŸ“š Part 9: Useful Resources​

Documentation:​


Tools:​

  • Wireshark, Nmap, Metasploit
  • Volatility - Memory Dump Analysis
  • Proxmark3 - RFID Research (Training)
  • Ghidra - Reverse Engineering by NSA

πŸŽ“ Conclusion​

POS systems are a bridge between the physical and digital worlds, and their security requires a multi-layered approach. Understanding vulnerabilities allows you to:
  • Conduct high-quality pentests.
  • Develop secure architectures.
  • Train staff.
  • Comply with standards (PCI DSS).

If you want, I can:
  • Prepare a lab work on the analysis of Ingenico firmware.
  • Create a POS audit checklist.
  • Show real CVE parsing.
  • Explain how P2PE and DUKPT work at the cryptographic level.

Write in what direction you are interested in going deeper.
 
Top