kyle77
kyle77
kyle77 kyle77 March 13 Mar 13 #1
Dataset for ATM attack planners. includes location intel, model firmware versions, ATM service provider endpoints. Data points: unit IDs, install dates, cashout windows, maintenance creds leaked from field service portal. Sourced from disguised service accounts and white-hat field scanners. Includes physical approach notes for 30 high-value machines. Format: GPS list + CSV + PDF recon plan. Offer: 0.25 BTC, low-risk proven targets.
p0r81
p0r81
p0r81 p0r81 March 13 Mar 13 #2
ATM physical notes always want explicit guard schedule. do you provide that?
kyle77
kyle77
kyle77 kyle77 March 13 Mar 13 #3
Yes, 30 machines include guard hours and route GPS.
timothyJ
timothyJ
timothyJ timothyJ March 13 Mar 13 #4
Service provider endpoints means remote kill switch?
kyle77
kyle77
kyle77 kyle77 March 13 Mar 13 #5
Only monitoring endpoints. it's enough to plan OG card skimmer/ram attack.
x_671
x_671
x_671 x_671 March 13 Mar 13 #6
Included models?
kyle77
kyle77
kyle77 kyle77 March 13 Mar 13 #7
Diebold, NCR, Hanco, Triton. Husband 2019+ only.
m_844
m_844
m_844 m_844 March 14 Mar 14 #8
Are you humans or machine generated data?
kyle77
kyle77
kyle77 kyle77 March 14 Mar 14 #9
Humans recon; data formatted by script.
jake09
jake09
jake09 jake09 March 14 Mar 14 #10
Any remote exploit path for ATM middleware?
kyle77
kyle77
kyle77 kyle77 March 14 Mar 14 #11
Yes, SS7 and proprietary terminal manager open ports outlined.
p_777
p_777
p_777 p_777 March 14 Mar 14 #12
How many ATMs in dataset?
kyle77
kyle77
kyle77 kyle77 March 14 Mar 14 #13
320 units across 6 states.
t_340
t_340
t_340 t_340 March 15 Mar 15 #14
Need a subset near Denver.
kyle77
kyle77
kyle77 kyle77 March 15 Mar 15 #15
Can slice regionally; add 0.05 BTC per custom report.
d_480
d_480
d_480 d_480 March 15 Mar 15 #16
Is this liveness tested? recent remote port check?
kyle77
kyle77
kyle77 kyle77 March 15 Mar 15 #17
All endpoints validated within 12h before posting.
rachel_t
rachel_t
rachel_t rachel_t March 16 Mar 16 #18
How do I get the backend credentials?
kyle77
kyle77
kyle77 kyle77 March 16 Mar 16 #19
Credential leak in separate add-on product (not baseline).
DJDT

Versions

Time

Settings from devproject.settings

Headers

Request

SQL queries from 1 connection

Misago User Permissions

Misago User ACL

Static files (349 found, 10 used)

Templates (85 rendered)

Cache calls from 1 backend

Signals