Inside .NET Smart Card Operating System
Offered By: 44CON Information Security Conference via YouTube
Course Description
Overview
Explore the inner workings of .NET smart card operating systems in this 54-minute conference talk from 44CON Information Security Conference. Delve into reverse engineering techniques for analyzing smart card software without specialized hardware equipment. Learn about code reverse engineering of vendor SDKs and card-host communication analysis to document card application file formats and runtime bytecode instructions. Discover how to produce effective test cases targeting the .NET virtual machine on smart cards. Examine topics like smart card security models, application development, vulnerability research, and the "Hive Mod" tool for manipulating digital signatures. Compare manual testing to automated tools and consider real-world attack scenarios. Gain insights into vendor responses, additional vulnerabilities, and the broader landscape of multi-application smart card platforms.
Syllabus
Intro
What is a smart card?
Single Application Smart Cards
Did you know?
Example: SIM Tracker Applet
In The News...
Why?
Smart Card Firewall
NET smart card overview
NET smart card security model
Public Key Token
Code Access Security
Data Access Security
Card application development
How secure is .NET card?
Smart Card Vuln. research
"Hive Mod" Tool
NET Card Binary
Manipulating Digital Signature Header
Attack Demo Let's use the Hive Mod tool to test this vulnerability!
Manual testing vs. Hive Mod
Real World Attack?
Fiction or Real?
Vendor's Response
More Vulnerabilities...
Conclusions
Multi-application Smart Card Platforms
Taught by
44CON Information Security Conference
Related Courses
Supply Chain Unchained - How To Be A Bad SaaS44CON Information Security Conference via YouTube Aviation Security 101
44CON Information Security Conference via YouTube The Anti-Checklist Manifesto
44CON Information Security Conference via YouTube Why Are We Still Doing Authentication Wrong?
44CON Information Security Conference via YouTube What Do Hackers See When They Look at the Clouds
44CON Information Security Conference via YouTube