pkuanvil
    • 版块
    • 标签
    • 帮助
    • 注册
    • 登录

    Banned presentation from mit students about how to perform subway attack

    Silence
    1
    2
    424
    正在加载更多帖子
    • 从旧到新
    • 从新到旧
    • 最多赞同
    回复
    • 在新帖中回复
    登录后回复
    此主题已被删除。只有拥有主题管理权限的用户可以查看。
    • ?
      游客
      最后由 编辑

      http://file.wikileaks.org/file/anatomy-of-a-subway-hack.pdf

      Summary

      Documentation for Boston T subway system. The file, created in June, 2008 using PowerPoint by Russell Ryan, Zach Anderson, Alessandro Chiesa, demonstrates lax security, failed security, and no security in an area of public transportation that the most people would consider "safe". The 87 page document shows the relative ease one can gain entry to the system and exploit it to gain relatively free access for subway use. Sabotage of the system is, along with exploitation, an easy task due to the poor security. In early August, the authors were prevented from giving a scheduled presentation [1] at DEFCON by a federal judge in a injunction filed by the Massachusetts Bay Transit Authority (MBTA). The Electronic Frontier Foundation (EFF) defended the students who had made an effort to contact the MBTA prior to their scheduled Defcon appearance. The temporary restraining order against the authors did not stop MIT's student newspaper from posting a copy of the presentation that had been included on a Defcon CD that had been distributed.

      The File Details How To:

      Generate stored-value fare cards
      Reverse engineer magstripes
      Hack RFID cards
      Use software radio to sniff
      Use FPGAs to brute force
      Tap into the fare vending network
      Social engineer
      Warcart 
      

      ref:
      1.https://wikileaks.org/wiki/Anatomy_of_a_Subway_Hack_2008

      1 条回复 最后回复 回复 引用 0
      • ?
        游客
        最后由 编辑

        如果探讨如何攻击公共设施属于学术自由而不属于恐怖主义,宣扬攻击公共设施的言论属于言论自由而不属于恐怖主义,那么还有什么不是自由?在袭击发生以后再追究责任是绝对不可取的。现代电子系统的安全性严重依赖Security by obscurity,在开发过程中几乎不可能做到完全不存在漏洞,因此需要通过隐瞒某些关键的技术细节,达到防止漏洞被发现、被利用的目标。而刻意揭露这些细节就是对这一安全措施最大的攻击,即便并非出于恶意,也应当受到限制。

        1 条回复 最后回复 回复 引用 0
        • 1 / 1
        • 第一个帖子
          最后一个帖子