IMPLEMENTATION OF MIFARE CLASSIC CRACKER
PUBLIC TRANSPORT SMS TICKET HACKING
SMS PARKING TICKET VULNERABILITIES
SECURITY ANALYSIS OF NFC PAYMENT CARDS
In the Moje eZdravie application, we identified a trivial vulnerability that allowed us to obtain personal information about more than 390,000 patients who were tested for COVID-19 in Slovakia (for the demonstration we managed to get personal information about more than 130,000 patients, of which more than 1600 COVID-19 positive).
POSSIBILITY OF WIDESPREAD LEAK AND MISUSE OF EU VACCINATION CERTIFICATES
We have identified a way for the EU to obtain vaccination certificates of all vaccinated citizens by exploiting several critical vulnerabilities:
1. We identified a critical vulnerability in eHranica https://korona.gov.sk/ehranica/
2. Using the portal https://www.portaludzs.sk/web/eportal/, we again found a way to use an enumeration attack to obtain the birth number of any person based only on their name and date of birth.
Discovery - information about the target system is identified and documented (WHOIS service, public search engines, domain registrators, etc.).
Enumeration - using intrusive methods and techniques to gain more information about the target system (port scanning, fingerprinting).
Vulnerability mapping - mapping the findings from the enumeration to known and potential vulnerabilities. Exploitation - attempting to gain access through vulnerabilities identified in the vulnerability-mapping phase. The goal is to gain user-level and privileged (administrator) access to the system (custom exploit scripts or exploit frameworks are used).
STANDARD WEB APPLICATION TEST
Due to the fact that a manual inspection is used, the test is highly recommended when you automatized security scanners have already failed. Provides a technical report with an executive summary, all revealed vulnerabilities, risk levels, and recommendations.
COMPREHENSIVE WEB APPLICATION AUDIT
CAN YOU WITHSTAND A PROFESSIONALLY LED ATTACK?
1. Information Gathering (Reconnaissance)
2. Targeted attack on the infrastructure and employees of the organization
3. Authorization Escalation and further infiltration
4. Final Report
In addition to a management summary, the final report contains a list of all paths (most of which are dead ends) that the Red Team tested. It documents the exact process by which the Red Team achieved its goal and the obstacles it faced during this process.
It includes a list of exploited vulnerabilities, including how to fix the vulnerability either completely or at least partially.
SMARTPHONE APPLICATION SECURITY AUDIT
USED TOOLS AND METHODOLOGY