- Hi everyone, my name is Roy Davis and welcome to my talk, “No Key? No PIN? No Combo? No Problem! P0wning ATMs for Fun and Profit. ” Shout out to all my homeys at DC612 in Minnesota.
00:16 - And for anybody that wants to get ahold of me about the content of this presentation, my contact information is all on the screen there.
00:23 - Before we get too far into this, I’ve got to say this content is provided for educational and entertainment purposes only.
00:30 - Unauthorized access of other people’s ATMs is illegal.
00:35 - Don’t do it. Don’t do it. You’re gonna go to jail.
00:39 - Secondly, this presentation is not associated with my employer in any way, except to say they’ve been very supportive of this opportunity and of me.
00:48 - And I really appreciate that. So why ATMs? There’s several answers to this question.
00:54 - The first being when I was a kid, I used to go to the grocery store with my mom and she’d walk up to this machine once in a while that said instant cash on the front.
01:03 - And I thought, man, this is great. How do I get a piece of this action? I want instant cash.
01:07 - And you know, a long time went by, I graduated college, I got into security and I got into pin testing.
01:14 - I never forgot about that childhood dream. I always wanted to learn how those things work inside, How can they can be configured or misconfigured? What does their network traffic look like, and how secure is that vault? In my opinion, cash is not going away anytime soon.
01:32 - Cash still provides a level of anonymity to people who use it, that cards just don’t give you.
01:40 - They leave a paper trail. ATMs are everywhere all over the world and increasing in numbers, as you can see in this chart between 2008 and 2019, doubling of the number of ATMs.
01:55 - A lot of people think, that own these machines in bars and restaurants and wherever, that as long as this thing keeps working, it’s good, right? The low levels of security maintenance adoption for these machines is incredible.
02:09 - If you think it’s hard to get PC users or like an InfraOps team to apply patches in production, imagine trying to get bar owners to update their ATM software.
02:19 - It’s really, really difficult. Also a lot of ATM security seems to me, based on obscurity and lack of design transparency.
02:29 - They’re missing huge amounts of documentation.
02:33 - Try searching in the internet sometime for communications protocols or encryption implementations or main board pin layouts.
02:41 - It’s really difficult to find anything about that.
02:44 - This is a document I found from 2002, discussing the Triton com protocol.
02:48 - It’s a preliminary release and it’s missing a lot of current info.
02:53 - I also believe that if honestly, researchers continue to expose vulnerabilities in these devices, the increased awareness can only serve to encourage the manufacturers of these devices to make them more secure, which makes all of us safer in the long run.
03:08 - The last reason I’m interested in this kind of research, is really all of these folks.
03:13 - A huge shout out and thank you to these pioneers in the ATM and electronic lock research field.
03:20 - They paved the way to establishing safe harbor for ATM vulnerability research.
03:25 - And I greatly appreciate and have enjoyed all of their work.
03:30 - I highly recommend watching these previous presentations if you want to learn more about things like ATM history, network attacks, firmware attacks, power analysis, and spike attacks and malware attacks.
03:42 - All of these previous researchers are brilliant.
03:46 - And in my estimation, most of it is probably beyond the capabilities of your average criminal.
03:54 - Today, we’re going to look at something a bit more on the physical side of attacks on ATM.
04:00 - So our agenda here is all about how I acquired my ATM.
04:06 - We’ll look at some damage, some ways people damage these things trying to get the money, some general ATM info, how I became a licensed operator and how that went in, and why I did that.
04:19 - We’re also gonna be picking the ATM case lock, resetting the ATM password and bypassing the electronic vault block.
04:27 - And then at the end, we’ll have some time for Q and A.
04:31 - All right, so what was my goal? It was a fully functioning ATM in my home, which I had complete access to.
04:38 - It’ll process ATM transactions, just like in the wild.
04:42 - And I want to research and understand the entire tax surface, including the network traffic, the internal serial comms, the data stored on the device, the vault and the cash dispensing unit.
04:54 - And so what I have here behind me is that device.
04:58 - It came true, and I’m going to tell you how that happened.
05:03 - These things are expensive, right? How did I get this thing? If you look on the internet, this thing, probably $4,000 new.
05:09 - Couple of grand, two, 3000 used. That’s too much for me if I’m gonna do some research.
05:14 - So things like Craigslist and eBay are your friends.
05:18 - I’d been looking for an ATM for a long time, when I found this one in 2018.
05:22 - The set, 100 bucks for both seemed like a deal.
05:26 - I quickly started researching how they worked and what was inside them and how to duplicate the attacks, Barnaby Jack had done in 2010.
05:34 - One of the things I found right away, default locks on these machines are garbage, commonly available locks and easy to pick with a rake.
05:41 - Also among other issues, I found that the audit logs in these ATM’s contain a wealth of information, including full debit card numbers and names of previous users in clear text and dates and amounts of transactions.
05:55 - That was sort of surprising to me. And so I got bored of these things as time went by.
06:01 - I really was interested in getting my hands on an ATM that ran some flavor of Windows, ‘cause Windows fun to hack and lots of known vaults.
06:10 - This saved search had an alert that was turned on.
06:14 - Any auction or ATMs for sale in Minnesota. Lo and behold, I got a hit.
06:19 - So here’s this auction in Cambridge, Minnesota, about an hour and a half north of me.
06:23 - And they were selling everything in this restaurant and gas station.
06:28 - This ATM was up for bid, and this is all the details I got.
06:31 - If you’ve ever been on auctions like this, you know that there’s a very limited amount of information.
06:35 - I called the place and inquired about the condition of the ATM asking, what does unknown working condition mean? They had no idea.
06:43 - Everything is being sold as is. It’s at foreclosure auction, is all they said.
06:47 - I did ask if there was any money in it, just kind of joking.
06:51 - The replies surprised me. There very well may be.
06:54 - This place got shut down with food on the shelves, drinks in the coolers and gas in the tanks.
06:59 - So at this point I have no idea. I think they’re just trying to get me to bid, right? Tell me whatever I want to hear.
07:05 - I bid a dollar. Now, I am quite competitive when it comes to auctions and I don’t like to lose.
07:12 - So of course I won with a bit of a $220 at the last second.
07:18 - This is the first time I learned, this email, I learned that I won.
07:22 - I also learned there’s no code for the cash box.
07:24 - I assume they mean the vault. Well, what’s going on here? I have no idea.
07:31 - What’s this thing actually worth? Is it worth anything? Am I gonna be able to get into? Is it doesn’t even work.
07:36 - Who knows? So I did a little digging and found out that first of all, these machines are worth 10 times what I paid for them.
07:42 - It’s a score, but maybe not if I can’t get into the vault and I can’t get this thing working.
07:50 - Well, where did this thing come from? A gas station barbecue sounded sort of interesting.
07:54 - Here’s the place that was auctioning off everything.
07:58 - It opened in 2018, February 1st, less than two years before I won this auction.
08:05 - Very strange. They’re gonna have Dickey’s Barbecue.
08:08 - If you’ve ever had it, it’s fantastic. I highly recommend it.
08:13 - March 18, kind of a review of the place. But uh oh, just a little while later, assets 43K, liabilities 1. 5 million.
08:23 - That’s probably not gonna work out long-term for any business owner.
08:26 - Things are starting to make sense here. So I hop in the car, hour 1⁄2 north to Cambridge, and this is what the place looked like when I got there to pick up my ATM, a lot different than opening day.
08:38 - I walk in and I’m at check-in and I’m talking to the lady there, and I say, what happened here? How did this place go out of business so fast that you couldn’t get the ATM pin for the vault or the top? And she says, as I understand it, there were some legal issues and the lender foreclosed and shut the place down.
09:01 - Okay. I don’t know anything about all that, but you know, that’s what you say.
09:05 - So I go back over to the ATM. Let’s get this thing going.
09:09 - Let’s just get this thing in the Jeep and get out of here.
09:12 - I was not anticipating that it was going to be literally bolted to the floor and completely immovable.
09:19 - Okay. So I can’t get into the vault to remove the nuts that are obviously holding this thing down to the floor.
09:25 - It’s in cement. So I call a locksmith and I said, hey, I’m at this gas station.
09:30 - I won this auction. Could you please come over and help me break into this ATM to help me move it? The answer was a resounding no, no.
09:41 - So I asked the lady, how am I gonna get this thing out of here? What’s gonna happen to this place? She said, I don’t care.
09:48 - You gotta have that thing outta here today.
09:50 - I don’t care what you do to get it out. I said, what if I have to damage the floor? No problem.
09:55 - They’re going to bulldoze this place at some point later.
09:57 - I don’t care. I’m just here to auction stuff off.
10:00 - Okay. All right. Well, I want this thing on damaged because I want to do research on it, and afterwards I may want to use this thing and start a business, make some money with an ATM.
10:11 - Who knows. So the only thing I can think of is go down to Home Depot and rent this guy, the Bosch Brute Turbo.
10:19 - Up to this point, I’d never used a jackhammer in my life, but how hard could it be, right? I’ve seen it done in cartoons. (chuckles) Well, so I start jackhammering and hitting the ATM a couple of times there and jackhammering some more and I’m getting a little further and jackhammering more.
10:37 - And it finally starts to come out and lean a little bit.
10:42 - It finally did fall over and I removed the concrete slab from the bottom, again, with the jackhammer.
10:48 - For anyone wondering, it takes a novice jackhammer user, roughly 40 minutes or so to get a ATM fully extracted from a cement floor.
10:58 - All right, here it is out on the curb. Into the Jeep it goes, and magically now it’s back that afternoon in my office.
11:07 - Mission accomplished. I plugged it in, booted it up and said, I’m staring at this thing like, okay, so now what? What do I have to do to make this thing fully operational? I want to stick my card in this thing and have it give me money.
11:20 - I have no idea. I have no idea what to do.
11:23 - Time to research. First thing I noticed when I put this thing up is it’s running Windows CE.
11:28 - That’s pretty interesting to me. What could possibly go wrong? I was looking for a Windows box.
11:33 - So the next thing I do is hook it up to my local LAN and run an Nmap scan.
11:38 - Now, you’ll see on the left here that I posted the Nmap scan, that Trey and Brenda So, Brenda did last year of Trey Gowden.
11:50 - Keown, sorry, and Brenda So at last year’s DEFCON.
11:55 - So they had a lot of open ports on this exact same model.
11:57 - I only had 5555 open, which I learned from their talk is the remote management agent.
12:04 - I did install the remote management software and connect to it, but I did not do any sort of penetration testing against that end point.
12:13 - It was very intriguing and very attractive to do that, but it was not the focus of my research at the time.
12:21 - Trey and Brenda also demonstrated an overflow attack against this port that allowed modification of settings within the ATM.
12:29 - I would love to learn more about that and try that attack here.
12:33 - Okay, so here is the screen when I boot up the machine, when I first boot it up.
12:38 - Apologies for the terrible photo. After booting, I get this thing.
12:42 - It says the encrypted pin pad has gone bad.
12:44 - I have no idea what that means. It needs to be replaced, I learned.
12:48 - Error is codes 97999 EPP Error. Alright, what’s this going to cost me? So 320 bucks later, I’ve got a refurbished one and things are getting a little bit expensive.
13:02 - And so at this point, I’ve got to install an EPP in a machine that I’ve never really taken apart or worked on, but at least I know how to get into the top, which we’ll see here shortly.
13:18 - First thing I needed to do was a little research on the inside of this machine.
13:21 - And along the way, I kind of put together this, a few slides about how ATMs work.
13:27 - So before we get too far, let’s just take a couple of minutes here.
13:31 - So there’s two main categories of ATM’s, with the distinguishing factors being the level of security the housing provides for the electronics and the money.
13:40 - The banking features available to users and the amount of money with in the machine itself.
13:46 - Drive up ATMs are typically associated directly with banks and are mounted in an external wall of a bank, especially built enclosure like this one, or as a standalone unit, like out in a parking lot.
13:59 - There’s really no easy access to the money or the electronics and the front of this machine.
14:02 - You really have to get into the building or get, you know, into the back somehow.
14:06 - A stealthy, undetectable, access takes time, knowledge, and skill or granted access as an employee.
14:13 - The second type of ATM is the one you’re probably most familiar with, and it’s the type I bought for my research.
14:18 - These are much less expensive and there’s far less security built into them because they’re designed to be installed where people are present and are working, like gas stations and such.
14:28 - They usually are not directly associated with any sort of bank, but they’re owner operated.
14:32 - So the gas station owner probably owns that machine as well.
14:36 - It changes the threat model a little bit here because there’s much less oversight to detect modifications to the ATM software housing or network connection.
14:45 - If this thing is installed in a hotel lobby or a big long hallway at a hotel conference center or somewhere, you know, a bowling alley, maybe where there’s not a lot of supervision.
14:58 - As we’ve seen, these things can be bolted directly to the floor, but many times they’re not because it’s a temporary use location or it’s going to be a limited time there or they move it around a lot, or for whatever reason, maybe they just can’t do that.
15:12 - They can’t bolt it to the floor. People trying to get access to the money in these machines, do a lot of damage, typically with various devices like blow torches, crowbars.
15:27 - This is actually the same machine I bought.
15:30 - And this one, this Triton 9100 looks like, somebody used some sort of a cutting tool.
15:35 - I’m not sure why they chose that spot. You can’t actually get to the money going through the side there.
15:43 - So they were probably very disappointed or caused more damage to the CDU unit in there.
15:50 - So during my research, I see all this damage and I’m thinking, is this really what it takes to get into one of these things? Can you do it any other way, and can you do it in a way that doesn’t leave obvious evidence? Maybe the answer is no.
16:05 - I don’t know. So this one’s my personal favorite because I like 4th of July.
16:14 - And so, anytime you go with explosives, I’m gonna watch.
16:18 - I’m not attracting any attention here for sure.
16:20 - So here we stick the incendiary device in the output of where the cash comes out, which is an interesting choice.
16:30 - And it just basically destroys the entire top, but the cash box remains intact.
16:37 - So that is not a good way to try and get into an ATM.
16:44 - I would be really surprised if anyone here has never used an ATM.
16:46 - So I’m sure you’re all familiar with these external parts that I’ve highlighted here.
16:49 - We’re gonna go past this. All of the ATM’s that you’ll see essentially have the same internal parts and external parts.
16:57 - One thing you can see here is the false door, the safe door cover.
17:03 - That is protected by a cylinder lock, which is typically keyed the same as the lock that protects the electronics.
17:10 - Behind that false door is the electronic lock key pad and the lock bolt handle.
17:15 - And you can see a wire coming out of the door here.
17:17 - That’s a power cable for the light over the cash dispensing portal on the vault’s door.
17:23 - All right, so let’s take a look inside the vault.
17:27 - Here, we can see the door where the money comes out, and dust below that.
17:33 - We can see the bolt action lever that lifts these huge teeth that interlock with the frame to keep the safe door shut.
17:41 - The safe door, by the way is about 70 pounds.
17:44 - It weighs more than anything else on the machine.
17:47 - There’s a look at the electric lock inside and there is what’s called the cash dispensing unit.
17:54 - Mounted on the cash dispensing unit is also a reject bin.
17:58 - And then there is the cash cassette, which plugs basically into a slot underneath the reject bin.
18:06 - So we’re going to take a look, a closer look at all of these different things.
18:09 - Inside here, you can see the belt-driven device that brings the money up and out of the cash dispensing unit.
18:18 - All right. So the next thing we’re going to look at here is the reject bin.
18:23 - Not very exciting, but I thought you guys might just like to look in there.
18:27 - This is where, you know, crumpled money goes, things that can’t go through the CDU.
18:32 - Oh, this is the back of the CDU. You can see the serial interface that goes up to the main board and also the power supply, which also goes up to the power supply in the main compartment.
18:43 - This here is the cash cassette. It also is locked with a tubular key to the lock.
18:50 - And inside, we can see the pressure driven dispenser.
18:56 - It’s spring loaded. You can see a few bills in there.
18:59 - This is where a 1000 bills can fit, if you so desire.
19:03 - Now this same machine that I have, even though it right now is configured with one cassette, it can be configured with three cassettes.
19:12 - So, the module just plugs right in. It’s really not a big deal.
19:16 - Giving this machine a cash capacity of $300,000 because each cassette can be configured to hold hundreds.
19:23 - So as we’re going to see, you know, you make the call at the end of this presentation, do you think that the locks and everything that are protecting 300,000, you know, potentially $300,000, do you think they’re adequate or not? Moving onto the top of the device, this lock is like I said, usually keyed the same as the front and as mentioned can be picked.
19:45 - I’m showing you there that the lock is indeed locked and I’m showing you there a cylinder lock pick.
19:52 - So these, these cylinder locks have seven or eight pins.
19:55 - This one’s particularly has eight pins. So I insert the pick and I start jiggling it back and forth, which moves the pics up into the right position, which moves the pins into the right position and unlocks the lock.
20:10 - So it didn’t take very long at all. You could also just buy this key on eBay.
20:16 - So if you are lucky enough to get your hands on an ATM, like I did for cheap, and you don’t have the key, here you go.
20:24 - Go buy a key. Okay. Now let’s have a look inside here, inside the top.
20:32 - Not many people get to look in here. I figured I’d give you a look here as well.
20:36 - Here are all the wires that go down to the CDU, and these come up and there’s the printer module.
20:43 - There’s the power supply, straight five-volt power supply, I believe, to the board and 12 volts everywhere else.
20:51 - Here is the receipt printer. It has its own board and a serial connection and power cables there.
20:57 - All of these cables come up through a junction, right at the base of the main unit, and there we see the main board.
21:04 - The main board here has an SD card, a lot of DIP switches that change modes and do various things.
21:11 - And we see any HDMI cable connector and a couple of USB ports.
21:16 - And then over here on the other side, we will see all of the different serial ports that drive the different pieces and parts of the ATM itself.
21:25 - There’s the ethernet cable. There’s the modem and the printer port.
21:29 - And down here, we have the card reader. That’s where all the money comes out and right below there is the electronic, the encrypting pin pad, the EPP that I replaced.
21:41 - All right, wonderful. So we see the inside and I mentioned the ethernet port.
21:49 - So this thing is obviously talking to the internet and it’s obviously somehow doing transactions.
21:54 - So how does that work? Well, whether it’s through a modem or it’s through a NIC or something, we get an internet connection to the PPH, the payment processing host using something called the Triton Protocol.
22:07 - And then from there, we’re going to go to what’s called the interbank network.
22:13 - So what is that? First of all, the processing host provides the connection information and encryption keys, which are configured in the ATM computer.
22:22 - They take a small percentage, the processor does of the transaction fee, which you know, is determined by the owner and charged to the user for each transaction.
22:33 - There’s hundreds of processing companies to pick from.
22:36 - I just threw up a few brands here. An interbank network.
22:40 - The next step is also known as the ATM consortium or the ATM network.
22:44 - And it’s a computer network that enables ATM cards that are issued by a financial institution that is a member of the network to be used in ATM’s that belong to another member of that same ATM consortium.
23:02 - And so the way that the banking industry came up in America, was very fragmented.
23:07 - So there was a lot of little mom and pop shops and a lot of little networks everywhere.
23:12 - In the 2000s, of like 2003, by then we had a consolidation resulting in three major interbank networks.
23:21 - And now about 70% of the volume in the United States goes over those three networks.
23:27 - Past talks on ATM hacking have discussed building a dummy backend for the ATM network for the ATM to connect to, that would pretend to be the payment processing host.
23:37 - But I really wanted to see what the real thing was like.
23:40 - So to do this, I had to become a licensed ATM operator.
23:45 - So why did I do that? Well, I really want the full, real experience.
23:50 - I want to understand exactly what does it take to take an ATM to full functioning and operate it after the fact.
23:59 - After my research has done, I want to put this thing in use.
24:02 - Minnesota is about to legalize weed, so maybe I’ll put it at a dispensary.
24:06 - I don’t know. So why do I have to be licensed? Well, the primary reason these laws exist in these licenses exists is to prevent money laundering and funding of nefarious activities.
24:20 - This is really tied to the Patriot Act of 2001.
24:23 - So you can imagine what I mean by nefarious activities.
24:28 - The licensing is done through NMLS or the National Multistate Licensing System.
24:34 - I provide, you know, processor information.
24:37 - There’s a background check. I have to fill out a bunch of paperwork.
24:40 - I have to show them my bank statements and let my bank know what I’m doing.
24:45 - I have to pay a couple hundred and license fees and it takes about four weeks or so, and you’re gonna do something wrong because no matter what you do, you’re gonna do it wrong and fill out the paperwork wrong, and you’re gonna to have to do it back and forth a few times and sit on hold with the state and whatever, but sooner or later, you will become a licensed financial terminal owner.
25:08 - All right, so I’ve got this thing on the network.
25:10 - I have my license. I can connect to the ATM network, the real thing.
25:14 - How am I going to do that? Well, I’m going to use a LAN tap because I want to do this very transparently.
25:21 - And not in any way that somebody can know what I’m doing.
25:27 - There’s no opportunity for traffic manipulation here.
25:29 - It’s really just sniffing, and I’m sniffing my own traffic.
25:33 - So as I run my own transactions with my own card, I can see what’s happening.
25:40 - Now, the way a land tap works is there’s a pass-through that goes directly through and is transparent to the server and the client.
25:49 - These other two ports that you can see are outbound from the ATM.
25:53 - So outbound traffic, which goes to my laptop and then inbound traffic coming inbound to the ATM, also goes to my laptop.
26:00 - And so if I spin up Wireshark and attach to both of those ethernet devices, I can see both way traffic.
26:08 - The problem is, it’s encrypted with TLS 1. 2.
26:12 - But the ATM provides you a way to upload your own signing certificate, which I found very interesting.
26:20 - If you put a self-signed cert on a USB and stick it into the back where we saw before, and you go to this screen, it says, download cert from USB.
26:30 - So I’m not really sure how that all makes sense, but it’s there.
26:37 - All right. So we’ve taken a little look at the inside.
26:40 - We’ve taken a look at the network. With EPP replaced, I can now successfully boot the ATM and insert some data.
26:49 - One side note here. Anytime I see a big red thing that says warning, and then do not, you know, do something.
26:55 - I always pay special attention to that. I like to do things that I’m not supposed to do.
27:02 - So this one says, don’t remove the cover. Bad things will happen.
27:06 - At some point, I’m gonna go look exactly into what that bad stuff is and see how this is implemented.
27:11 - It sounds like a really interesting research project.
27:14 - So anyway, booting this time, I get this great error message says, FFFFFF.
27:19 - That means that I need to to provide some more set up information into the machine.
27:28 - All right. So to access the admin screen, I’ll do enter, clear, cancel, one, two, three.
27:34 - All right. And so this gives me this nice enter password UI, right? But I don’t know the password.
27:46 - This is the pin I need to get to the admin interface.
27:49 - I tried multiple times to reach anyone associated with the previous owner.
27:54 - Still no luck. So I have no idea. The pin is stored in memory somewhere on that board.
28:00 - I have no idea how to get to it. I don’t know if it’s encrypted.
28:04 - It’s good to note that this password is different than the safe combination.
28:09 - The safe vault lock does not have any idea that this interface or this computer even exists.
28:16 - They’re completely separate. This is just to get access to the admin operator interface.
28:21 - The default password here is 555555. I know that because it’s in their documentation, but unfortunately for me, that didn’t work.
28:30 - I tried and I tried and I tried, and I was up very late.
28:33 - The UI does give you three chances to enter the correct password, but then it’ll send you back to the start screen again, and then you have to do enter, clear, cancel, one, two, three.
28:41 - After a few days of guessing and falling asleep in my chair, after guessing I gave up and looked for other ways.
28:49 - So it turns out after a lot of Googling and reading, I found that in recent versions of the software, Hyosung has implemented a security feature where the operator function passwords cannot be reset to factory default unless performed during the machines first boot after reloading the software.
29:07 - If there’s any way around this, I have no idea.
29:09 - I couldn’t find it. The search continues.
29:12 - All right, so how does the software re-install work? Well, various versions of the ATM software available if you search around.
29:20 - I found this one and downloaded it. I would love to find some older versions of this.
29:24 - If anybody knows where I can get my hands on some older versions of the software for the Triton 2700 CE, I would really appreciate it.
29:33 - This set that I found was, I think the most recent version.
29:39 - And so I put it on an SD card. There’s various files here.
29:43 - If you want to know what they do, I think Brenda So talked about that in last year’s talk.
29:50 - I did delve into the update folder where I found a master zip file, and opening that is super fun.
29:56 - There’s lots of fun stuff to play with here.
29:58 - I’m not sure if the bat files or some of these other files, the icons and the backgrounds have any sort of CRC associated with them, if there’s anything run on those, if you can modify those and put them back on this disc and stick it in the machine and have it do some fun stuff.
30:16 - That’s a another research topic altogether that I wish I had time for and we’ll probably do in the future.
30:23 - So my SD card goes in this slot. I have to push down DIP switch number four, to make it boot into diagnostic mode.
30:32 - And this is where the computer will do all kinds of fun stuff and read things off the SD card.
30:38 - So pick SD card, and now we’re doing a software update.
30:42 - This takes about 10 minutes or so. That’s what this install looks like.
30:45 - And after you do that, it will reboot, and now you’ll get the same screen, and we can reset the master password.
30:54 - All right, so here’s how we do that. We reboot again, and during the initializing screen, we get out our old Nintendo fingers and do left, right, clear, left, right, clear, clear, cancel clear, left, right, clear, clear, cancel.
31:10 - If successfully recognized, the machine will ask you if you want to reset the master password.
31:17 - And then it will be set back to 555555. There’s one caveat to this.
31:23 - It’s not gonna happen unless the safe door is open.
31:28 - If the safe door’s not open, you’re just gonna get back to this screen.
31:31 - And so, at this point, the safe door is not open, but I need to open it.
31:37 - I need to open it and to complete the password reset for the computer, and I need to get into it to see if there’s any cash in there, right.
31:44 - I really don’t want to destroy the door in the process.
31:47 - I’ve already explained why. So the first question that I have is, you know, how does this computer know the door’s closed? There must be a sensor somewhere in there connected to the door, connected to the main board.
32:00 - I have access to the main board. I should be able to do this.
32:03 - So I reached for my favorite tool, the borescope.
32:07 - This here is a DEPSTECH unit. Five megapixels, HD resolution, the rechargeable battery, wireless connectivity, it’s great.
32:15 - Wired is rigid. You can bend it around corners, you know, and it’s 50 bucks on Amazon.
32:20 - How could you go wrong? As we’ll see later in this talk, I did use this other tool, this other smaller scope called an otoscope.
32:29 - It’s made to stick in your ear. This has a diameter of 5. 5 millimeters, much smaller than the previous one.
32:38 - It’s about 50 bucks for this camera as well.
32:41 - So I got the scope inside the ATM using the corners of the cash dispensing tray, and also that hole where the wire came off of the lining of the door.
32:53 - This is what I see inside. It’s the reject bin.
32:56 - I can see the lock, the electronic safe lock down there.
32:58 - I can also see some wires over far down there.
33:02 - If I turn the borescope a little bit, I can see a rigid.
33:06 - I can see the wire, or I can see the safe switch, the momentary switch is the word I was looking for.
33:16 - This momentary switch which is connected to the door and the door is pushing it in, and it’s basically telling the computer the door is open or closed.
33:24 - Following this wire up away from the momentary switch and across through some portion of the ATM, it finally does surface through this hole, up to where the main board is.
33:37 - It comes over to this junction where it’s conveniently labeled front.
33:41 - And then it goes on over to the board where it’s labeled CN16.
33:47 - So if I unplugged this, the question is, does it fail open or closed? Well, let’s do an experiment to find out.
33:55 - I recorded this demo after I had the vault door open and the ATM was all set up and operational.
34:00 - But the results are the same because the door’s closed now, and the ATM is operational because of the door is closed.
34:06 - If I pull the door sensor plug, then the computer should think that the door is open and it should become not operational.
34:15 - So what happens is, I pull out the plug and it says, the door is open, the ATM is temporarily out of service.
34:23 - But it’s not, right? We just saw the doors closed, but this is exactly what we needed in this case.
34:28 - So I pull out the plug, I reboot. And while initializing, we do clear, left, right, clear, clear, cancel.
34:35 - And we get to this screen, Reset Master Password.
34:39 - Reset master password. Click, yes. All right.
34:43 - It reboots one more time. I get here, I do 555555.
34:47 - And here I am as an administrator inside the computer.
34:54 - All right. So at least one of you is wondering what was that QR code back there? Well, it’s nothing.
35:00 - I’m not sure why that’s there. It does not seem to be something that is alterable through the configuration and it just leads to nothing.
35:09 - A Google search, I guess. I have no idea.
35:11 - Alright, so now the password’s reset. I can get to the ATM.
35:14 - Inside, I can configure it as I wish, but we really need to get into the safe to make this thing fully operational and, well, see what’s in there, right? So, how? Well, first things first.
35:25 - What lock is this thing? Back to the borescope for some recon.
35:30 - I can see the lock. I can see some writing on it.
35:34 - It turns out with a little Googling, I find that all the ATMs, all of this particular type of ATM uses this LaGard LG Basic Electronic Lock, and this is what it looks like.
35:45 - Now, in 2016 at DEFCON 24, Plourde did a great talk about side channel attacks on this type of lock.
35:52 - He used the side channel attacks to deduce the correct combination of this Sargent & Greenleaf Titan PivotBolt, very similar to the lock that I have, the LaGard Basic, but not exactly the same one.
36:04 - However, this YouTube video by EEVBlog attempting the same attack on LaGard lock, but without success.
36:12 - So I decided to come up with another way. To figure out how these things work, I ordered one.
36:17 - And I also found out that there’s another option, which I assume works the same sort of way, along the same lines as Plourde’s attack.
36:26 - This is called a Little Black Box, and this device as well as this Phoenix device, they basically can reset the safe combo.
36:37 - So you take the cord that goes into the safe from the key pad and you hook it up to this device.
36:48 - It determines what lock you have hooked up to, and then you click reset.
36:54 - And what it’s gonna do now is some sort of an attack against the lock itself.
37:00 - I believe it basically guesses every combination in less than 15 minutes.
37:06 - And once it guesses the combination, I guess somehow it resets it.
37:11 - I really don’t know how this thing works. You can only buy this if you’re law enforcement or if you own a bank or are a licensed locksmith.
37:21 - So it costs about $3,000, and I don’t know that much money, so I need a another way.
37:28 - So I take off the cover. We see the circuit board.
37:31 - If you take the circuit board out, then you can see like the lock mechanism with the bolt and the rotation axis of the bolt.
37:39 - The main volt handle forces down and rotates it in a clockwise direction.
37:45 - There is an anti force mechanism here. There’s a spring and a notch on the lock.
37:49 - And the bolt, if you push down too hard, that notch basically engages and you can’t push anymore.
37:57 - If we are able to rotate that lock fully clockwise, then it will push that secondary bolt over into the notch, into that linchpin.
38:08 - Now that linchpin will stop the secondary bolt from going over there, unless we type in the correct code, which then provides a nine volt DC charge to the little motor attached to the linchpin.
38:21 - The motor runs, the linchpin is moved and we can open the lock.
38:25 - All right. So now we know how this thing works.
38:28 - Here’s a closeup of the DC motor in the linchpin.
38:31 - And again, if we, if we apply a charge to the motor, then it’ll open.
38:36 - So basically all the money in this vault, $300,000 potentially is protected by the lack of voltage to this DC motor.
38:43 - So is there a way from the outside of the vault to get voltage to this DC motor, without anyone knowing, or without destroying the lock or destroying the vault, or just throwing the case? Let’s have a look.
38:56 - This is a short video of the lock-in action.
38:58 - Look in the middle of the lock at that linchpin, and you’ll see, after I type in the code, the motor turns, the linchpin goes up, which would allow the bolt to turn and the lock to open.
39:10 - All right, so here’s a look at the key pad.
39:13 - And another interesting thought that I had was, you know, there’s a lot of space inside this keypad thing that mounts on the front, and it doesn’t appear to me just doing some cursory research that there’s any encryption of the numbers that are pressed on the keypad as it’s being sent into the lock.
39:37 - And so what you see here is a small experiment with an Arduino Nano in which I’m hitting keypad presses on, pressing on the keypad and recording the key presses into an Arduino Nano, and then passing that back on out to the lock.
39:57 - Very interesting research can be done here.
40:00 - I believe this is a successful man-in-the-middle attack against this particular lock.
40:06 - So, yeah, moving on from that, we can see that I wasn’t gonna be able to use that attack to get into my safe.
40:16 - I had to continue on. Here are the power wires.
40:19 - They pass directly under the circuit board on the door side of the lock.
40:23 - So the metal you see in this picture would be actually against the door, and the locks sits directly behind this keypad and the keypad is removable.
40:35 - And if we do remove the keypad, we can see through the hole where the wire goes to the lock, that it is indeed the back of the lock.
40:42 - And it gives us this little nice landmark to know exactly where on the lock we are because of this little silver, solid silver dial.
40:51 - I have no idea what it does, why it’s there, but it is there and it gives us a landmark.
40:56 - That little red X you see is exactly where those wires are that we need to get access to.
41:02 - All right. So I need the right tool for the job to get access to this.
41:05 - Something I’ve always wanted, an electromagnetic drill press.
41:09 - All right, so you’re probably saying, wait a second, this is cheating, right.
41:13 - Well, hear me out, hear me out. I figure if I can just get a visual on those wires from the outside, I can come up with a way to supply current to them.
41:20 - And there just happens to be an existing hole in the door from the factory that allows for a different orientation of the keypad if you want.
41:28 - The hole is a quarter inch in diameter, and it’s exactly where I needed to be.
41:32 - And it’s there from the factory. I need this to be a little bit bigger, but not too much.
41:37 - I went with a half inch carbide bit. So I made the hole diameter a quarter inch bigger.
41:42 - All right. Well, I put this bit in and I get my drill hooked up.
41:49 - Now this drill has a binding capacity of about 3000 pounds per square inch.
41:56 - It’s not going anywhere once you turn it on.
41:58 - And the RPMs of this drill is about 1200. A carbide tipped drill bit, really no match for this safe door.
42:09 - It really only takes a couple of minutes to get in there.
42:12 - It takes me a little bit longer, ‘cause I’m not exactly sure what the depth is.
42:15 - But suffice to say, I get into the lock without damaging it in any way.
42:21 - And now we can see the wires of interest. And now keep in mind if I put the keypad back on, our mischief is fully concealed and nobody is the wiser.
42:32 - All right, so the last piece of the puzzle.
42:33 - How do I get power to these wires through this half-inch hole without breaking the lock? After a lot of thinking and digging around, I figured out that there’s this tool called a puncture probe.
42:44 - It’s exactly what I needed. This is how it works.
42:47 - The idea, you retract the probe, the puncture pin, you get the wire in there and you release the pin into the wire and you have connectivity and you can connect a wire down at the base of the probe.
43:00 - So this is kind of what that looks like. I built my own probes because those plastic ones were far too big.
43:06 - So what I’m doing here is I’ve punctured these wires on my work bench and I’m applying a nine volt charge to them, and you can see that it is opening.
43:17 - Again, the problem was that these were way too big for the access port that I had drilled, and I certainly didn’t want to cheat anymore by making the hole bigger.
43:24 - So I designed something smaller. At the time I used this little piece of wire with a hook on the end.
43:31 - And here you can see that, you know, this is what it looks like when it’s all set up.
43:38 - I hooked up the nine-volt battery and nothing happened.
43:41 - I was a little worried that my nine-volt battery was bad, so I hooked it up to a DC power supply, and I gave it 17 volts, just, you know, in case it needed a little more extra juice.
43:52 - Here’s the full scene when the vault was opened for the first time back in, I believe, the end of March, early April.
44:02 - And yeah, so you can see the scope there, and you can see my tool, the tool that I use, the puncture probe.
44:12 - You can see the wire tool that I created, the inside through the borescope.
44:17 - And then here we go, the door is open for the first time and we can see inside.
44:23 - So here’s a demo of what just happened. As you can see, the lock is locked as I pushed down on it and attaching the probes and applying voltage, and the lock opens.
44:37 - I’m gonna skip forward because I’m running out of, I’m a little bit, running out of time here.
44:43 - So we’re just gonna go pass this one to… Again, if I put the keypad in place, there is no evidence of intrusion.
44:54 - And as an added bonus, if you want to go the extra mile, you can cover the access hole with this half inch plastic cover.
45:02 - Barely noticeable, right, right? All right.
45:06 - So again, not as satisfied with the smaller probe.
45:08 - There must have been a way to do it with a smaller hole.
45:12 - So I started taking these pros apart. I pulled off the plastic sheeting and saw the probe inside.
45:17 - I went and grabbed a stainless steel, three mil tube.
45:22 - I put a little notch in it, in the end and heated up the tube to melt into the plastic of the probe.
45:28 - And this is what it looks like when it’s all together.
45:31 - And it’s a lot smaller. It’s 6. 2 mil versus 2. 9.
45:36 - So a lot smaller, which means I can now do this attack with a much smaller hole.
45:41 - All right, some loose ends quickly. I sent dormakaba this letter to let them know some pre disclosure, pre-talk disclosure.
45:52 - I never got any response from this. Here is my email to security at Hyosung America.
45:59 - I never got a response to this one either. So I got a delivery failure notice, instead.
46:06 - As far as the money, there was money in the ATM.
46:10 - I’m a trusted source, advice. I am not gonna tell you exactly how much it was.
46:15 - I will not disclose that, but there was enough to pay for the research project and the ATM and a little bit leftover.
46:22 - All right, some follow up research. ATM Wi-Fi, really cool, I think.
46:27 - The vault lock, man-in-the-middle I showed, ATM software modifications we talked about.
46:34 - Maybe the USD and SD card could be fun to mess with.
46:37 - Internal serial comms between the top and the bottom, right between the CDU and the computer.
46:43 - Can we capture and replay? How about EPP deconstruction analysis? That warning message we saw.
46:51 - All of those topics, I think are fascinating, and I will continue research.
46:54 - If anybody else wants to join me, please reach out to me.
46:58 - So in conclusion, no key, no pin, no combo, no problem.
47:04 - Thanks for watching. Have a great day.
47:07 - And I hope you have a fabulous DEFCON. Bye-bye. .