Robert "hackajar" Imhoff-Dousharm and Jonathan "ripshy" Duncan, Credit Card Networks Revisted: Penitration in Real-Time

Published: May 28, 2006, 12:34 a.m.

Credit card authorization is the core to all major businesses, both on and off the Internet. Yet an alarming number of businesses are not taking the right steps to insure that your credit cards are secure against fraud and theft. In bringing this to light (Credit Card Networks 101, July 31 2003 - DC 11), you were awed at the posibility, but were not provided with any real proof. This year we, that's you and I, will walk through the process of identifying credit card traffic on a network, decyfering packets and propagated rouge credit card data to a host comeputer. You will be provided access to a private Wi-Fi network. This networks will have credit card data streamming across it for you to sniff. With your help, we will discover information about credit cards packets, and how to design our own packet to be sent.

Want to partcipate?

1. Login to http://www.hackajar.com/credi
2. Read "What's in a credit card" section for background on credit cards and their supporting networks
3. Read "What you"ll need" section, and have said items at conference
4. Sign-up for fake credit card account, you will use this to keep track of your progress and win prizes

NOTE: You will have opportunity to sign-up for account during demonstration

Robert "hackajar" Imhoff-Dousharm In the last 2 years, Robert has worked for Shift4, a Credit Transaction Gateway. As an Analyst he insures best fraud practices, compliceny and security are meet at all clients sites He has worked with government agency's during fraud investigations. He also works with new and potential clients to implement best practice in software design of credit card intigration software Robert has spoken at DefCon 11 (Credit Card Networks 101) about the potential risks currenly impeading on credit card networs. He will demonstrate those risks this year with "Credit Card Networks Revisted: Penitration in Real-Time".