Practical exploitation of rounding vulnerabilities in internet banking applications
|
|
|
- Francine Fisher
- 10 years ago
- Views:
Transcription
1 Practical exploitation of rounding vulnerabilities in internet banking applications Adrian Furtunã, PhD, OSCP, CEH
2 Agenda Who am I Rounding vulnerabilities How to fix Exploitation techniques Digipass automation Demo
3 Who am I PhD in Information Security, OSCP, CEH Penetration tester at KPMG Romania Web applications, internet banking Network infrastructures Mobile applications Source code reviews + some annoying stuff Teaching assistant at Information Security Master programs from Bucharest universities Teaching penetration testing classes Organizing Capture the Flag contests Always like to prove my point
4 Rounding vulnerabilities
5 Rounding vulnerabilities Real life example How much do you really pay?
6 Rounding vulnerabilities Real life example How much do you really pay? What about: 2.85$ $ = 6.05$?
7 Rounding vulnerabilities Real life example How much do you really pay? What about: 2.85$ $ = 6.05$? How much does the seller win from rounding?
8 Rounding vulnerabilities Real life example How much do you really pay? What about: 2.85$ $ = 6.05$? How much does the seller win from rounding? We are a bit vulnerable
9 Rounding vulnerabilities In Internet Banking apps Banks are vulnerable also
10 Rounding vulnerabilities In Internet Banking apps Banks are vulnerable also Amounts are specified with two decimals:
11 Rounding vulnerabilities In Internet Banking apps Banks are vulnerable also Amounts are specified with two decimals: What happens when you transfer EUR to your account? Amount += 8.34 EUR => Bank wins EUR
12 Rounding vulnerabilities In Internet Banking apps Banks are vulnerable also Amounts are specified with two decimals: What happens when you transfer EUR to your account? Amount += 8.34 EUR => Bank wins EUR What happens when you transfer EUR to your account? Amount += 8.35 EUR => Bank loses EUR
13 Rounding vulnerabilities In Internet Banking apps Banks are vulnerable also Amounts are specified with two decimals: What happens when you transfer EUR to your account? Amount += 8.34 EUR => Bank wins EUR What happens when you transfer EUR to your account? Amount += 8.35 EUR => Bank loses EUR Max to win/lose: EUR / transaction Rounding is done to the closest value (two decimals)
14 Rounding vulnerabilities How to always win? Let s make transactions that will be always rounded in our favor
15 Rounding vulnerabilities How to always win? Let s make transactions that will be always rounded in our favor How? Foreign exchange transactions Transfer between your own accounts having different currencies
16 Rounding vulnerabilities Obtain a better exchange rate Transfer money between your own accounts (e.g. RON -> EUR) Specify how much RON you want to sell RON EUR EUR (rounded) 100 * (0.023 RON -> 0.01 EUR) => 2.3 RON = 1 EUR Actual exchange rate (RON / EUR rounded) Official The best not good
17 Rounding vulnerabilities What about Rubla? Transfer money between your own accounts (e.g. RUB -> USD) Specify how much RUB you want to sell RUB USD USD (rounded) 100 * (0.17 RUB -> 0.01 USD) => 17 RUB = 1 USD Actual exchange rate (RUB / USD rounded) Official The best not good
18 Rounding vulnerabilities Compute your own exchange rate -banking/exchange-rate-improver
19 Rounding vulnerabilities Example (1)
20 Rounding vulnerabilities Example (2)
21 Rounding vulnerabilities When is the best deal Foreign exchange transactions: Specify how much you want to sell => destination will be rounded Specify how much you want to buy => source will be rounded Best deal is when you can specify how much of the weaker currency you want to sell/buy because the stronger currency will be rounded
22 Rounding vulnerabilities How much can I gain? C1 = minimum amount of currency 1 that can be exchanged (e.g RON) C2 = minimum amount of currency 2 that can be exchanged (e.g EUR) Ex_b = exchange rate for buying C2 with microtransactions (e.g. 2.3) Ex_b = C1 / C2 Ex_s = exchange rate for selling C2 (e.g. 4.4) real exchange rate fixed by the Bank Ex_b Ex_s x RON y EUR z RON Currency Multiplication rate Initial amount (x) z = y * Ex_s = (x / Ex_b) * Ex_s = x * (Ex_s / Ex_b) multiplication rate = Ex_s / Ex_b transactions required = x / C1 Final amount (y) Gain Transactions required RON 4.4 / 2.3 = RON 190 RON 90 RON ~ 20 EUR 100 / = 4347 RUB / 17 = RUB 1900 RUB 900 RUB ~27.8 USD 1000 / 0.17 = 5882
23 Rounding vulnerabilities Different exchange rates (buy / sell) Banks have different exchange rates for buying and for selling so they can always win Let s say Official exchange rate: RUB/USD You buy USD from the Bank: You sell USD to the Bank: But for small amounts it is not true! I buy from the Bank (RUB USD) 0.32 RUB / = USD 0.01 USD 0.32 RUB / = USD 0.01 USD 0.32 RUB / = USD 0.01 USD 0.32 RUB / = USD 0.01 USD 0.32 RUB / = USD 0.01 USD
24 How to fix
25 How the Banks should protect themselves Limit the number of transactions that can be performed in a given time by a regular person Introduce a small fee for currency exchange operations (e.g EUR) Limit the minimum amount that can be transferred in a foreign exchange operation Monitor for suspicious transactions (numerous transactions, very small amounts) State in the contract that such transactions are illegal
26 Exploitation techniques
27 Exploitation techniques General ideas Find a way to do lots of transactions in a relatively short time Transactions are made in two steps: Initialization (can be automated) Authorizing / Signing (requires human interaction) Automate / bypass transaction signing mechanism (digipass, SMS, token, etc)
28 Exploitation techniques Technique 0: No signing required 3000 transactions, 90 minutes, 30 RON 73 RON, gain ~10 EUR
29 Exploitation techniques Technique 1: Init lots and sign once Initiate lots of transactions automatically and sign once
30 Exploitation techniques Technique 1: Init lots and sign once Initiate lots of transactions automatically and sign once Use Burp Suite to initiate transactions
31 Exploitation techniques Technique 1: Init lots and sign once Initiate lots of transactions automatically and sign once
32 Exploitation techniques Technique 1: Init lots and sign once Initiate lots of transactions automatically and sign once Signing can also be automated stay tuned for next chapter
33 Exploitation techniques Technique 2: Payment files Upload a payment file containing lots of transactions and sign once
34 Exploitation techniques Technique 2: Payment files Upload a payment file containing lots of transactions and sign once Signing can also be automated stay tuned for next chapter
35 Exploitation techniques Technique 3: Real time transactions + rainbow tables Do real time transactions automatically and sign using pre-computed digipass responses
36 Exploitation techniques Technique 3: Real time transactions + rainbow tables Do real time transactions automatically and sign using pre-computed digipass responses Applicable when signing is done using challengeresponse mechanism, with challenge code <= 5 digits
37 Exploitation techniques Technique 3: Real time transactions + rainbow tables A challenge-response digipass returns the same response for the same challenge code every time Response = f(challenge, timestamp, client ID, other data) = f(challenge, static data) Build rainbow tables with digipass responses Feasible for max 5 digit challenge codes Max possibilities Can be automated, stay tuned
38 Exploitation techniques Technique 4: Real time transactions + digipass automation Do real time transactions automatically and sign using digipass responses computed in real time
39 Exploitation techniques Technique 4: Real time transactions + digipass automation Do real time transactions automatically and sign using digipass responses computed in real time Requires automation of the signing device (digipass, phone, etc)
40 Digipass automation
41 Digipass automation LimID project (for VASCO GO3) Code regenerates at 30 seconds Video
42 Digipass automation My machine (for VASCO 550) Requires PIN authentication Used for: 2 nd factor authentication Transaction signing
43 Digipass automation My machine - video
44 Digipass automation My machine - current performance 10 transactions / minute (1 transaction / 6 seconds) max transactions / day enter PIN, type challenge code, read response image, do OCR Our previous example: 100 RON 190 RON (gain ~20 EUR) => 4347 transactions * 6 sec/trans = sec = 7h:14m:42s 1000 RUB 1900 RUB (gain ~27.8 USD) => 5882 transactions * 6 sec/trans = sec = 9h:48m:10s Maximum amount to multiply per day: * RON = RON => final RON gain 298 RON ~= 68 EUR/day * 0.17 RUB = 2448 RUB => final 4651 RUB gain 2203 RUB ~= 68 USD/day
45 Digipass automation My machine - current performance What about doing in parallel (on multiple bank accounts)? Money making machine?
46 Digipass automation External vs Internal instrumentation Internal instrumentation (direct electrical connections): Pros: more reliable and faster almost error free Cons: might not be possible some digipasses deactivate when opened must know the pinout of LCD screen (lots of pins!) sensitive soldering required mistakes can lead to deactivation External instrumentation: Pros: No interference with digipass s internals Can be applied to any digipass model Cons: Pretty slow (but good for the low and slow approach) Some (mechanics) errors occur on pressing buttons (resolvable by a more professional construction) OCR process needs special (lighting) conditions to produce correct results
47 Digipass automation My machine implementation details (1)
48 Digipass automation My machine implementation details (2) Optical Character Recognition Original Cleared background Blurred Threshold applied OCR-ized gocr / ocrad _16g _5_G50 043i i_ì OG3i _i_i 9a G1G
49 Digipass automation My machine development stages
50 Live Demo Q & A Thank you! Adrian Furtunã, PhD, OSCP, CEH [email protected]
Penetration Testing - a way for improving our cyber security
OWASP EU Tour Bucharest 2013 The OWASP Foundation http://www.owasp.org Penetration Testing - a way for improving our cyber security Adrian Furtunǎ, PhD, OSCP, CEH [email protected] Copyright The OWASP
Penetration Testing in Romania
Penetration Testing in Romania Adrian Furtunǎ, Ph.D. 11 October 2011 Romanian IT&C Security Forum Agenda About penetration testing Examples Q & A 2 What is penetration testing? Method for evaluating the
Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014
Security Testing Vulnerability Assessment vs Penetration Testing Gabriel Mihai Tanase, Director KPMG Romania 29 October 2014 Agenda What is? Vulnerability Assessment Penetration Testing Acting as Conclusion
PuttyRider. With great power comes great responsibility. # Pivoting from Windows to Linux in a penetration test. Adrian Furtunã, PhD adif2k8@gmail.
PuttyRider # Pivoting from Windows to Linux in a penetration test With great power comes great responsibility Adrian Furtunã, PhD [email protected] root@bt:~# Agenda # Idea origin and usage scenario #
Penetration Testing. Types Black Box. Methods Automated Manual Hybrid. oless productive, more difficult White Box
Penetration Testing Penetration Testing Types Black Box oless productive, more difficult White Box oopen, team supported, typically internal osource available Gray Box (Grey Box) omixture of the two Methods
Digipass Plug-In for IAS troubleshooting guide. Creation date: 15/03/2007 Last Review: 24/09/2007 Revision number: 3
Digipass Plug-In for IAS troubleshooting guide. Creation date: 15/03/2007 Last Review: 24/09/2007 Revision number: 3 Document type: Whitepaper Security status: EXTERNAL Summary This document explains how
The Banker Profit System Review
The Banker Profit System Review URGENT UPDATE! The Banker Profit System By Andrew Teegan Hey! Read This Truthful The Banker Profit System Review And Testimonial: This review will provide you a clearer
Two-Factor Authentication
Two-Factor Authentication This document describes SonicWALL s implementation of two-factor authentication for SonicWALL SSL-VPN appliances. This document contains the following sections: Feature Overview
Bitsquare arbitration system
Bitsquare arbitration system Version 1.0 (last edited: January 03 2016) Arbitrator selection 1 The user must select at least one arbitrator when doing a trade. He can only select among arbitrators with
BUSINESS 24 Banking BCR. User manual
BUSINESS 24 Banking BCR User manual Contents 1. Description of the service 2. Definitions 3. The TOKEN DIGIPASS device 3.1. PIN code 3.2. OTP code 3.3. DS code 3.4. Synchronization of the TOKEN device
Security vulnerabilities in new web applications. Ing. Pavol Lupták, CISSP, CEH Lead Security Consultant
Security vulnerabilities in new web applications Ing. Pavol Lupták, CISSP, CEH Lead Security Consultant $whoami Introduction Pavol Lupták 10+ years of practical experience in security and seeking vulnerabilities
Allianz Global Investors Remote Access Guide
Allianz Global Investors Remote Access Guide Web Address: http://remote.allianzgi-us.com/ Page 1 of 34 pages Please contact the Service Desk at Table of Contents 1. Introduction to the Remote Access Page
Threat Intelligence Pty Ltd [email protected] 1300 809 437. Specialist Security Training Catalogue
Threat Intelligence Pty Ltd [email protected] 1300 809 437 Specialist Security Training Catalogue Did you know that the faster you detect a security breach, the lesser the impact to the organisation?
Three Hot Tactical War Room Strategies That Will Explode Your Sales
Special Report $29.97 Three Hot Tactical War Room Strategies That Will Explode Your Sales Tactical Strategy No. 1. Emotions vs. Logic in Persuasion I am frequently asked whether emotion or logic is more
Identikey Server Getting Started Guide 3.1
Identikey Server Getting Started Guide 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without
Testing Best Practices
ALMComplete, QAComplete, DevComplete This document is used as a guide to improving your testing and quality assurance processes. 1 Test Case Creation Once requirements have been created and approved, while
SyncSwitch Quick Start Guide For Making First Test Call V 2.1
SyncSwitch Quick Start Guide For Making First Test Call V 2.1 This version is a revision of V. 2.0, some gramatical mistakes has been corrected on this version. There are no major changes between V.2.0
BT 24 User Manual 1. Useful information... 4 2. Application access... 6 2.1 First log into BT24... 6 2.2 Subsequent logins into BT 24... 6 2.
BT 24 User Manual 1. Useful information... 4 2. Application access... 6 2.1 First log into BT24... 6 2.2 Subsequent logins into BT 24... 6 2.3 Password changing... 7 2.4 How I reset the password... 8 2.5
Digipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Getting Started
Digipass Plug-In for IAS IAS Plug-In IAS Microsoft's Internet Authentication Service Getting Started Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of
Guide for Designing Cyber Security Exercises
Guide for Designing Cyber Security Exercises VICTOR-VALERIU PATRICIU Computer Science Department Military Technical Academy Bucharest, Bd. George Cosbuc, no. 81-83 ROMANIA [email protected] ADRIAN
DIGIPASS Authentication for Sonicwall Aventail SSL VPN
DIGIPASS Authentication for Sonicwall Aventail SSL VPN With VASCO IDENTIKEY Server 3.0 Integration Guideline 2009 Vasco Data Security. All rights reserved. PAGE 1 OF 52 Disclaimer Disclaimer of Warranties
Creation date: 09/05/2007 Last Review: 31/01/2008 Revision number: 3
Middleware 3.0 troubleshooting Creation date: 09/05/2007 Last Review: 31/01/2008 Revision number: 3 Document type: Whitepaper Security status: EXTERNAL Summary This document explains how to troubleshoot
CLOUD PERFORMANCE TESTING - KEY CONSIDERATIONS (COMPLETE ANALYSIS USING RETAIL APPLICATION TEST DATA)
CLOUD PERFORMANCE TESTING - KEY CONSIDERATIONS (COMPLETE ANALYSIS USING RETAIL APPLICATION TEST DATA) Abhijeet Padwal Performance engineering group Persistent Systems, Pune email: [email protected]
Host Discovery with nmap
Host Discovery with nmap By: Mark Wolfgang [email protected] November 2002 Table of Contents Host Discovery with nmap... 1 1. Introduction... 3 1.1 What is Host Discovery?... 4 2. Exploring nmap s Default
A Business Owner s Guide to: Landing Pages
A Business Owner s Guide to: Landing Pages A Business Owner s Guide to: Landing Pages Are you looking to increase your online conversion rates? Are you tired of getting traffic but not having anything
User's manual for OTPdirekt Internet Banking. v.1.0
User's manual for OTPdirekt Internet Banking v.1.0 1 Contents General... 4 Log in... 4 Logging out... 4 Home page... 5 Accounts... 5 Accounts - Overview of movements... 6 Accounts - OTPdirekt transactions...
Currency Trading and Forex 100 Success Secrets 100 Most Asked Questions on becoming a Successful Currency Trader
Currency Trading and Forex 100 Success Secrets 100 Most Asked Questions on becoming a Successful Currency Trader Copyright 2008 Currency Trading and Forex 100 Success Secrets Notice of rights All rights
This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
Optimize Sales Order Management with Enterprise Content Management
OpenText Solution Brief OpenText ECM Suite for SAP ECM for Sales Order Management by OpenText Objectives Solution Benefits Quick Facts Optimize Sales Order Management with Enterprise Content Management
Business On Line Payments Plus Customer Support Guide
Business On Line Payments Plus Customer Support Guide This document is published by Bank of Ireland, and both it, and its contents, are the property of Bank of Ireland. This document may not be reproduced
Hard vs. Soft Tokens Making the Right Choice for Security
Hard vs. Soft Tokens Making the Right Choice for Security HSTE-NB0012-RV 1.0 Hypersecu Information Systems, Inc. #200-6191 Westminster Hwy Richmond BC V7C 4V4 Canada 1 (855) 497-3700 www.hypersecu.com
1. Make sure that no client accounts are open. 2. Click on Setup, then click Modem. The Modem Setup window will appear.
SECURITY SYSTEM MANAGEMENT SOFTWARE FOR WINDOWS WINLOAD MODEM SETUP The modem setup is a very important step in the connection process. If the modem setup is not properly completed communication between
Accessing Derbyshire County Council s Outlook Web Access (OWA) Service. Smart Phone App version
Accessing Derbyshire County Council s Outlook Web Access (OWA) Service Smart Phone App version Contents About this guide... 2 Before accessing Outlook Web Access... 3 Accessing Outlook Web Access (OWA)
Internet Banking Two-Factor Authentication using Smartphones
Internet Banking Two-Factor Authentication using Smartphones Costin Andrei SOARE IT&C Security Master Department of Economic Informatics and Cybernetics Bucharest University of Economic Studies, Romania
DIGIPASS Authentication for Check Point Security Gateways
DIGIPASS Authentication for Check Point Security Gateways With IDENTIKEY Server 2009 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 38 Disclaimer Disclaimer of Warranties and
Accepting Cross-Border Online Payments
Accepting Cross-Border Online Payments LinkedIn Profile 16+ years professional experience working with top tier global firms 12+ years focused on financial services and payments Business development, sales,
New U-Direct: Quick Guide/Frequently Asked Questions
Outline New U-Direct: Quick Guide/Frequently Asked Questions 1. Getting Started 1.1. How can I enroll for Internet Banking (U-Direct)? 1.2. Why is my U-Direct Login Page not loading properly? 1.3. How
Updated 08/2015. Wire Transfer User Guide
Updated 08/2015 Wire Transfer User Guide Wire Transfers The Wire section provides you with the ability to create one-time wires or set up template-based wires for ongoing use. Wiring Funds The tasks you
THE MOST COMPLETE, ADVANCED, EASIEST TO USE MARKETING SYSTEM FOR THE REAL ESTATE INDUSTRY
THE MOST COMPLETE, ADVANCED, EASIEST TO USE MARKETING SYSTEM FOR THE REAL ESTATE INDUSTRY THE SITUATION 95% of home buyers start searching for their new home online before ever calling a Realtor. Sellers
5 Pitfalls To. Avoid For. Sucessful
5 Pitfalls To Avoid For Sucessful Forex Trading Contents Page Legal and Copyright 3 Introduction To The 5 pitfalls 4 Pitfall 1- Unlimited Losses 6 Pitfall 2-Forex Brokers Closing Our Accounts 8 Pitfall
Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015
Mobile OTPK Technology for Online Digital Signatures Dec 15, 2015 Presentation Agenda The presentation will cover Background Traditional PKI What are the issued faced? Alternative technology Introduction
Intro to Patching. Thomas Cameron, Chief Architect, Western US, Red Hat [email protected] twitter: thomasdcameron IRC: choirboy on Freenode
Intro to Patching Thomas Cameron, Chief Architect, Western US, Red Hat [email protected] twitter: thomasdcameron IRC: choirboy on Freenode RHCA, RHCSS, RHCDS, RHCVA, RHCX Agenda 2 Who am I? Who are you?
Q&A: Your Ebook Engine
Your books. Your brand. Your customer. Q&A: Your Ebook Engine 1. What is Ebook Engine? Ebook Engine enables you to sell electronic books with your existing e-commerce infrastructure. 2. So how exactly
Building Secure Multi-Factor Authentication
Building Secure Multi-Factor Authentication Three best practices for engineering and product leaders Okta Inc. I 301 Brannan Street, Suite 300 I San Francisco CA, 94107 [email protected] I 1-888-722-7871 Introduction
Handbook for finding the right FX Broker
Handbook for finding the right FX Broker With currency trading becoming even more popular, the number of brokers is growing at a rapid rate. What should one look at when deciding which broker to open an
Swedbank Business Internet Banking User Manual
Swedbank Business Internet Banking User Manual Content Introduction 1. HOW TO START 1.1 USING INTERNET BANKING 1.2 TERMINATING INTERNET BANKING SESSION 2. INTERNET BANKING SECURITY 2.1 PASSWORD SYSTEM
INTEGRATION GUIDE. DIGIPASS Authentication for Juniper SSL-VPN
INTEGRATION GUIDE DIGIPASS Authentication for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data
Hitachi ID Password Manager Telephony Integration
Hitachi ID Password Manager Telephony Integration 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Functional integration 2 2.1 Self-service password reset....................................
Learning objectives for today s session
Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP Learning objectives for today s session Understand what a black box and white box assessment is and how they differ Identify
STEP BY STEP GUIDE TO USING LARGE BUSINESS TOKENS. Large Token (Vasco DP250) Activation on Account. Activate Token Once Obtained
a refreshing attitude to banking STEP BY STEP GUIDE TO USING LARGE BUSINESS TOKENS Large Token (Vasco DP250) Activation on Account Activate Token Once Obtained 1. On token press the arrow key. ( ) 2. Enter
THE XFOREX. Mini E-book Guide for Forex Beginners. Currency Trading. Guide
THE XFOREX Mini E-book Guide for Forex Beginners Currency Trading Guide XForex has prepared for you an exclusive sneak peek into our E-book. The Mini E- book is designed to provide you with an overall
Article title goes here unless article begins on this page. If article begins on this page, override rules and text using Ctrl + Shift.
Article title goes here unless article begins on this page. If article begins on this page, override rules and text using Ctrl + Shift. 18 DEPT NAME Build it, break it, fix it: Competing to build secure
NEECOM BAR CODES, RFID, MOBILE COMMERCE AND THE OBLIGATORY INTERNET OF EVERYTHING
NEECOM BAR CODES, RFID, MOBILE COMMERCE AND THE OBLIGATORY INTERNET OF EVERYTHING May, 2015 Paula Giovannetti AIDC 100 Automatic Identification & Data Capture AIDC Technologies Include: Bar Codes Magnetic
How To Protect Your Data From Attack
Integrating Vulnerability Scanning into the SDLC Eric Johnson JavaOne Conference 10/26/2015 1 Eric Johnson (@emjohn20) Senior Security Consultant Certified SANS Instructor Certifications CISSP, GWAPT,
Payment systems. Tuomas Aura T-110.4206 Information security technology
Payment systems Tuomas Aura T-110.4206 Information security technology Outline 1. Money transfer 2. Card payments 3. Anonymous payments 2 MONEY TRANSFER 3 Common payment systems Cash Electronic credit
Business On Line Payments Plus Guide
Business On Line Payments Plus Guide This document is published by Bank of Ireland, and both it, and its contents, are the property of Bank of Ireland. This document may not be reproduced or further distributed,
Greater Than One. Defeating strong authentication in web applications. - Brendan O Connor
Greater Than One Defeating strong authentication in web applications - Brendan O Connor Introduction Background Information Control Types Device Fingerprinting One Time Passwords Knowledge Base Archives
MyQ Version Comparing (v5.2)
THE FIFTH VICTORY AND THREE PRESTIGIOUS AWARDS IT PRODUCT OF THE YEAR 2014 IN THE CATEGORY PRINTING SOLUTION Server Pro Version available MyQ 5.2 MyQ 5.2 Commercial use The original cloud licensing / network
2013 Eon Technologies. 24 Banking Personal Internet Banking U S E R G U I D E
24 Banking Personal Internet Banking U S E R G U I D E CONFIDENTIALITY STATEMENT All materials on this document are protected as the copyrights, trademarks and/ or other intellectual properties owned by
VerticalResponse for AppExchange: Past, Present and Future
VerticalResponse for AppExchange: Past, Present and Future Presented By: Joshua Feinberg: VP, Product Management Alex Scalisi: Sales Executive Special Guest Speaker: Judy Loehr: Senior Sales & Marketing
Learn How Employees Use Tallie Expense Report Software
Learn How Employees Use Tallie Expense Report Software Tallie is online expense report software for businesses. Tallie improves the productivity of your entire team by automating the complete expense report
Contextual Authentication: A Multi-factor Approach
Contextual Authentication: A Multi-factor Approach Multi-factor Authentication Layer v.3.2-003 PortalGuard dba PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 617.674.2727 E-mail:
BACK OFFICE MANUAL. Version 1.2 - Benjamin Bommhardt DRAGLET GMBH Bergsonstraße 154 81245 München - Germany
BACK OFFICE MANUAL Version 1.2 - Benjamin Bommhardt DRAGLET GMBH Bergsonstraße 154 81245 München - Germany Contents Introduction... 3 Overview of cxadmin... 4 Dashboard... 4 Customer overview... 5 Markets...
Maverick FX Trading. Forex 101 Session #4 Preparation for Demo Trading
Maverick FX Trading Forex 101 Session #4 Preparation for Demo Trading Session #3 Review Time frames Relative Strength/Weakness Determine Strong/Weak News Events Correlations Session #4 Schedule Demo Account
Mobile Banking User Guide 2015
Mobile Banking User Guide 2015 Page 1 Page 2 Mobile Banking Overview Mobile Banking enables anyone with an online banking account to access their account information from a mobile device. Mobile Banking
"Breakthrough New Software Automates The Optimization Process To Get You A #1 Ranking - All With The Single Click Of A Button!"
7 Days To Massive Website Traffic - Day 5 "Breakthrough New Software Automates The Optimization Process To Get You A #1 Ranking - All With The Single Click Of A Button!" Let's get right to it... The software
How the Internet is Impacting Revenue Management, Pricing, and Distribution. E. Andrew Boyd Chief Scientist and Senior Vice President PROS
How the Internet is Impacting Revenue Management, Pricing, and Distribution E. Andrew Boyd Chief Scientist and Senior Vice President PROS 1 Prices and Sales 2 A Common Business Model List Price for Each
High Frequency Trading Volumes Continue to Increase Throughout the World
High Frequency Trading Volumes Continue to Increase Throughout the World High Frequency Trading (HFT) can be defined as any automated trading strategy where investment decisions are driven by quantitative
Top 3 Choices for Internet File Sharing Service Providers
Phone: 404-202-8657 P. O. Box 768122 Fax: 770-552-8392 Roswell, Georgia Email: [email protected] 30076 Top 3 Choices for Internet File Sharing Service Providers Research Report and Recommendations By:
INTEGRATION GUIDE. DIGIPASS Authentication for Citrix NetScaler (with AGEE)
INTEGRATION GUIDE DIGIPASS Authentication for Citrix NetScaler (with AGEE) Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is';
UAG Series. Application Note. Unified Access Gateway. Version 4.00 Edition 1, 04/2014. Copyright 2014 ZyXEL Communications Corporation
UAG Series Unified Access Gateway Version 4.00 Edition 1, 04/2014 Application Note Copyright 2014 ZyXEL Communications Corporation Table of Contents Scenario 1 How to Activate a Paid Access Hotspot...
Mark Bennett. Search and the Virtual Machine
Mark Bennett Search and the Virtual Machine Agenda Intro / Business Drivers What to do with Search + Virtual What Makes Search Fast (or Slow!) Virtual Platforms Test Results Trends / Wrap Up / Q & A Business
BUSINESS ONLINE USER MANUAL
BUSINESS ONLINE USER MANUAL Version, date: June 2015 Table of Contents INTRODUCTION... 3 SECURITY... 4 WHAT IS DHB BUSINESS ONLINE?... 5 User Profiles... 5 APPLICATION... 6 If you are already using DHB
Application Security Testing. Jesper Kråkhede
Application Security Testing Jesper Kråkhede AST 2015-10-22 2 Others call it security and try to avoid it I call it passion and dive right into it Jesper Kråkhede Worked as a security consultant for 17
Dongwoo Kim : Hyeon-jeong Lee s Husband
2/ 32 Who we are Dongwoo Kim : Hyeon-jeong Lee s Husband Ph.D. Candidate at Chungnam National University in South Korea Majoring in Computer Communications & Security Interested in mobile hacking, digital
Closed captions are better for YouTube videos, so that s what we ll focus on here.
Captioning YouTube Videos There are two types of captions for videos: closed captions and open captions. With open captions, the captions are part of the video itself, as if the words were burned into
Chapter 1.1. The Forex Market
Chapter 1.1 The Forex Market 0 THE FOREX MARKET The Forex market is the largest financial market in the world. Nearly $3.2 trillion worth of foreign currencies trade back and forth across the Forex market
Drupal Performance Tuning
Drupal Performance Tuning By Jeremy Zerr Website: http://www.jeremyzerr.com @jrzerr http://www.linkedin.com/in/jrzerr Overview Basics of Web App Systems Architecture General Web
Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011
Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing
Introduction A BUYER S GUIDE TO DOCUMENT MANAGEMENT
1 Introduction There are few initiatives that can deliver more productivity and security to a business than implementing an Electronic Document Management System (also known as an Electronic Content Management
Strong Authentication in details
Strong Authentication in details Kuznetsov Alexander Technical Account Manager VASCO Core Activities Overview DIGIPASS DIGIPASS Go Range DIGIPASS E-signature DIGIPASS Reader DIGIPASS for Mobile DIGIPASS
What s New in SharePoint 2016 (On- Premise) for IT Pros
What s New in SharePoint 2016 (On- Premise) for IT Pros This article is based on notes taken during a public presentation at the Microsoft Ignite event by presenter Bill Baer. A video of the session can
Pentests more than just using the proper tools
Pentests more than just using the proper tools Agenda 1. Information Security @ TÜV Rheinland 2. Penetration testing Introduction Evaluation scheme Security Analyses of web applications Internal Security
WELCOME TO FXDD S BULLISH OPTIONS STRATEGY GUIDE
GLOBAL INTRODUCTION WELCOME TO FXDD S BULLISH OPTIONS STRATEGY GUIDE A bullish options strategy is one of the most common starting points for options trading beginners. Bullish options strategies are designed
Conventional Files versus the Database. Files versus Database. Pros and Cons of Conventional Files. Pros and Cons of Databases. Fields (continued)
Conventional Files versus the Database Files versus Database File a collection of similar records. Files are unrelated to each other except in the code of an application program. Data storage is built
Agenda. Federation using ADFS and Extensibility options. Office 365 Identity overview. Federation and Synchronization
Agenda Office 365 Identity overview 1 Federation and Synchronization Federation using ADFS and Extensibility options 2 3 What s New in Azure AD? Cloud Business App - Overview 4 Identity Management is
Two Factor Authentication and PKI Token (for Windows)
Two Factor Authentication and PKI Token (for Windows) What s happening? Dow Jones is implementing two factor authentication to increase security and provide ease of use to end users. What is Two Factor
Zimbabwe. Online Banking User s Guide
User s Guide Dear Customer, Thank you for choosing our services and welcome to the world of next generation financial services. Standard Chartered allows you to perform banking with a click of a button
The Social Accelerator Setup Guide
The Social Accelerator Setup Guide Welcome! Welcome to the Social Accelerator setup guide. This guide covers 2 ways to setup SA. Most likely, you will want to use the easy setup wizard. In that case, you
