Description: So what do you do when you are given a target that is not your standard network or web based device? In this presentation I will explain the ISO8583 Messaging and how I went about performing a penetration test on these systems. I will explain my research process on ISO8583 and the steps I went through to be able to communicate with these systems.
BIO: 15 years experiance in the I.T. industry. Worked the last 6 years in Information
Tags: securitytube , hacking , hackers , information security , convention , computer security , derbycon-2012 ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.