# HG changeset patch # User Christian Urban # Date 1462536908 -3600 # Node ID 2d9e005100f4e2e132ac633252cac095f5629727 # Parent e5d97ef272f90de391f11ec7519df5a86f474685 updated diff -r e5d97ef272f9 -r 2d9e005100f4 handouts/ho01.pdf Binary file handouts/ho01.pdf has changed diff -r e5d97ef272f9 -r 2d9e005100f4 handouts/ho01.tex --- a/handouts/ho01.tex Thu Apr 07 13:02:36 2016 +0100 +++ b/handouts/ho01.tex Fri May 06 13:15:08 2016 +0100 @@ -219,6 +219,18 @@ \url{https://www.youtube.com/watch?v=ET0MFkRorbo} \end{center} +\noindent An article about reverse-engineering a PIN-number skimmer +is at + +\begin{center}\small +\url{https://trustfoundry.net/reverse-engineering-a-discovered-atm-skimmer/} +\end{center} + +\noindent +including a scary video of how a PIN-pad overlay is +installed by some crooks. + + \subsection*{Of Cookies and Salts} Let us look at another example which will help with understanding how diff -r e5d97ef272f9 -r 2d9e005100f4 handouts/ho03.tex --- a/handouts/ho03.tex Thu Apr 07 13:02:36 2016 +0100 +++ b/handouts/ho03.tex Fri May 06 13:15:08 2016 +0100 @@ -4,6 +4,9 @@ \usepackage{../graphics} \usepackage{../data} +%https://pentestn00b.wordpress.com/safe-to-hack-sites/ +%http://pastebin.com/raw/0SNSvyjJ + \begin{document} \fnote{\copyright{} Christian Urban, King's College London, 2014, 2015, 2016}