We do hope this project makes you shiver.
“Financial risks” is an audiovisual installation that reacts when you swipe your credit card and prints an odd looking receipt if you type in your pin-code. Even though the website contains few technical details (read none) about the build, we chose to feature the project as we find his intent interesting:
‘Financial Risks’ installation is a project designed to present an ironical viewpoint on encoded wallets, as a data input interface invites to overcome fear of impossibility to control spread of confidential information for the sake of curiosity of interaction with an object of art.
The piece consists of 6 bank card readers, a hardware system of sound and video synthesis, a keyboard for pin code entering, a 2-channel sound system and a cash register printer configured to print images. Up to 6 cards simultaneously may be used for playing.
We do hope that nothing is stored in the platform’s memory… but is the installation monitored?
[nevdull] found himself in possession of a magnetic card reader. What else was he to do but show us all how to read from it using an AVR? He goes through the basics of how the card reader works, as well as how to detect the different card states such as entering, reading, leaving. There is source code to download to try for yourself, but unless you have the same reader, you’ll have to do some modifications. While this doesn’t get you all the way to reading the complete content off of the card, its a great start. Maybe you guys can help him finish up the last bits.
After building a USB magnetic stripe reader, [David Cranor] has found a way to fool a magnetic stripe reader using a hand-wound electromagnet and an iPod. The data on a card is read and stored on a computer, then encoded as a WAV file using a C++ program. The iPod plays the WAV file with the data through a single-stage opamp amplifier connected to the headphone jack. The amplifier is used to drive the electromagnet. Video embedded after the jump.
By no means is this a new idea. There have been a lot of mangetic stripe projects and software. This project in particular references the 1992 Phrack article “A Day in the Life of a Flux reversal” by [Count Zero].
Don’t get your hopes up just yet on strolling through high security installations using this little device. It can only replay the data from a card that has been recorded. If you don’t have a known working card, it won’t get you very far.
Continue reading “Magnetic stripe card spoofer”
I’ve never trusted putting my PIN number at a store, and now I’m glad I don’t. In an effort to prove just how hackable those handy input terminals are, [saar drimmer] and [steven murdoch] replaced the guts of a pin terminal with… tetris. Hmm, now I need a gameboy tetris fix Thanks [terti]
A word of warning, the embedded video made Mozilla nutty on my usually rock solid machine.