Smart-Card Hacking? 32
W3bbo asks: "With the ever-increasing information being stored on so-called 'Smart-Cards', including credit cards with the chips, how do we know what data is read by stores when you hand over your plastic? Seaching for 'smart-card hacking' just turns up satelite TV piracy websites and virtually nothing for (sort-of) legitimate investigation to our cards. So what methods are available to hack smart-card chips and see what information about us our banks store on our cards?"
it's called carding... (Score:4, Informative)
http://www.kallipse.com/creaweb/galaad/carding.ph
Also there is an open source project devoted to reading cards and chips, don't remember the name right now...
Was on slashdot, so have a check 8)
Re:it's called carding... (Score:5, Informative)
Re:it's called carding... (Score:2)
That's what I call 1337!!1111
Did you notice the clue on a useful source of technical data
Re:it's called carding... (Score:2)
Kind of Esoteric, But... (Score:5, Informative)
Depending on how far down you want to dig (do you want to learn about applications? Circuit design? Interfaces? Security issues?) you should probably browse around related manufacturers' pages and related newsgroups. A good example would be looking at PKCS#11-related docs, Entrust implementation docs, the Javacard specifications, how Javacards differ from other implementations, docs on "Open Platform", types of card readers (class 1 through class 4, what is "middleware", how hardware key storage works, etc.)
A lot of card-related documentation and information is strongly vendor-specific, poorly documented and, to be honest, largely irrelevant for someone who wants to learn about it in a not-too-hardcore manner.
If you're professionally seriously interested, I recommend talking to one of the serious pros, such as Jerome Ajdenbaum [iteon.net] who really know their stuff. For starters, though, a quick google search on "smart card" +documentation turned up a number of good results, including from Microsoft [microsoft.com] (whose card interface for many manufacturers and variants is surprisingly well-written),
Re:Kind of Esoteric, But... (Score:3, Informative)
However, do any stores actually use the smartcard portion of the card? All I have seen is using the mag-strip on the back and nothing more (which is usually just your account number, expiration, and name on the card). So there is no "secret" information that is even being used on the card.
Once you get into it you will realize that smartcards are not some magical device designed to invade p
Re:Kind of Esoteric, But... (Score:5, Informative)
Along with PKCS#11 and Javacard, you should be looking at all the ISO 7816 specifications for technical information.
The ISO 7816 specs are generally not free. You buy them from your national standards body, which in the US is ANSI. It'll cost around $150-$200 to buy the whole set from ANSI.
However, much of the content of the 7816 documents is replicated in the EMV specifications. EMV stands for Europay Mastercard Visa and is a consortium for establishing smart card banking standards, so if you're interested in looking at your bank card chip, that's the more relevant set of documents anyway. You can find all of the EMV documents on-line, free, at the EMVCo web site [emvco.com]. You may still have to acquire some of the 7816 specs (parts 3 and 4 are probably the most important), but the EMV docs contain most of what you need. Word of warning: be prepared to plow through a lot of material. Smart card technology has acquired a lot of complexity through 30 years of incremental enhancements.
Re:Kind of Esoteric, But... (Score:2)
Re:Kind of Esoteric, But... (Score:3, Interesting)
One common implementation of the key store Cthefuture mentioned uses the concept of a fixed-size "private" store on the card to protect your private keys via some sort of applet (as on a Javacard) or similar application. A "smart card" is basically a tiny computer with an external power source--it provides a processor and storage on board.
Your public keys will reside in a "public" store, typical
Re:Kind of Esoteric, But... (Score:2)
To answer the main question, this data is usually protected anyway: if you don't have the right key, you will get nothing*.
Regards,
AIP
* unless you're very smart and have access to a few million dollars
Who else finds it funny... (Score:2, Funny)
Re:Legitimate Investigation? (Score:3, Insightful)
2:) hacker(traditional meaning) mentality
3:) setting up your own credit card reader to go into bussiness as a manufacturer
No "sort-of" about it... (Score:2)
I think it's important to understand that there is no "sort-of" about it. We have every right to know what information is contained on the cards that we use. Why wouldn't we? What can there possibly be there that is none of our business?
Re:No "sort-of" about it... (Score:2)
Re:No "sort-of" about it... (Score:1)
Your Homeland Security Threat Rating???
Maybe this is too obvious... (Score:1)
Brett
Card security attacks (Score:4, Informative)
Information leaking e.g. power analysis: observe the power consumption of a divide to determine what operations it is executing and what data it is working on. Usually these will only tell you the number of bits which are on in a particular stage. I found the ARM 6 gave a very clear signature of the result of the adder and could determine the number of on bits down to the nearest 2.
Error introduction e.g. clock glitch attack: This is an asynchronous engineers favorite. Basically a method of inserting errors into the processor in a deterministic method. Say the processor stage calculating a compare operation is the worst case path, the attack inserts an early clock forcing the comparison to be incorrectly made. Place this in the "are the checksums correct" code. Usually though these are a little more difficult than that.
Brute force with limited tries e.g. Flash charge pump: So to crack your card it only takes as many attempts as there are pin code combinations. To stop people from just trying out the 10,000 or so combinations the card remembers how many tries you had. Before it writes something to the flash it needs to drive up a charge pump. This is visible using power analysis and at this point you cut the power and try again.
More interestingly why are these not investigated? Well because there is no money for it. The async community has been offering better methods but the companies who make the only get a tiny profit are not inclined to make them any better.
h1kari did some smart card work: (Score:1)
Circuit Cellar (Score:1)
MUSCLE project (Score:3, Informative)
http://www.linuxnet.com/ [linuxnet.com]
Frighteningly enough (Score:2)
Phrack (Score:1)