Attacking ICS Devices - Threat Emulation with Conpot

  Рет қаралды 15,403

John Hammond

John Hammond

Күн бұрын

Пікірлер: 36
@elbee1473
@elbee1473 4 жыл бұрын
name a better youtuber. go ahead, ill wait
@WanderTrekker
@WanderTrekker 4 жыл бұрын
John Hammond
@R4yan-
@R4yan- 4 жыл бұрын
John Hammond
@Philbertsroom
@Philbertsroom 4 жыл бұрын
pewdiepie
@steez4778
@steez4778 4 жыл бұрын
"better youtuber"
@steez4778
@steez4778 4 жыл бұрын
hahahhaahahah funny dad joke hahahhahahahahah
@bertomoore
@bertomoore 4 жыл бұрын
Your videos always seem to address something I'm learning or that interests me. Thank you for being the person that sparked my journey into cybersecurity. I can't thank you enough.
@yes-iz9ek
@yes-iz9ek 4 жыл бұрын
Thats really awesome, thanks for putting this out
@CyberCelt.
@CyberCelt. 2 жыл бұрын
This was really great John. Would love if you did more on ICS home labs given the issues with Conpot. Maybe there are others
@sentinalprime8838
@sentinalprime8838 4 жыл бұрын
amazing one john been waiting for this you rock man .....
@AbdennacerAyeb
@AbdennacerAyeb 4 жыл бұрын
You are amazing open sourcing knowledge.
@kakashisharigan336
@kakashisharigan336 Жыл бұрын
Incredible video!
@94muehli
@94muehli 4 жыл бұрын
I'm working in industrial automation. I specialized in ICS systems. If you have any questions feel free to contact me.
@Pharm8alin
@Pharm8alin 4 жыл бұрын
Good job, congrats.
@chrisb4009
@chrisb4009 3 жыл бұрын
The difficult bit you’re missing here is the mapping of MODBUS coils/registers to process variables. A MODBUS master/slave just looks like an Excel sheet full of numbers.
@Kawachi69
@Kawachi69 7 ай бұрын
bro i really need an updated video on this. docu is so bad
@IDM69420
@IDM69420 4 жыл бұрын
hey man... can u give me some tips? where should i start? im 16, and trying to get into cybersecurity... what university degree should i go with. ive heard that most cybersecurity stuff at colleges are outdated.. should i go with computer science and certifications later? sry for my poor english, im not native..
@yopla250
@yopla250 4 жыл бұрын
My question is: where do you find documentation for implementing those PLC communication messages? Just quickly looking for the S7-200 documentation gave me a headache...
@chrisb4009
@chrisb4009 3 жыл бұрын
Siemens are the masters of writing 200 pages when 10 will do.
@CybersecProf
@CybersecProf 4 жыл бұрын
Will the slides or presentation be available to view offline after?
@iGrave
@iGrave 2 жыл бұрын
Alright - So a tank doesn't exist in isolation. A PLC Dev would never (I hope) implement a 'drop tank level' command. (Good) PLC devs operate with a philosophy of 'how do I make sure the tank maintains an optimal level', and 'how do I ensure the system behaves in a failsafe way, especially if the physical hardware fails in any number of specific ways'. Lets say we're trying to fill the tank. The tank itself should have some sort of level feedback - be it a digital high level sensor, or an analog feedback (the tank is 69% full). Analog feedback is more flexible because the operator can set soft limits, typically a High and High-High level. (say at 80% and 95%). The tank will have some pipework feeding into it, perhaps with some combination of pumps and/or valves. Those valves will have a hard interlock with the tank High level feedback, i.e., the software completely disallows the pumps to run and forces the valves to close if it believes the tank is going to overfill. Control of the tank will typically look like - if the tank lowers to a low level setpoint, run the pumps until the tank reaches a high level setpoint. Once you reach that setpoint, stop the pump. This will all happen automatically without any sort of operator interaction. Remember, the point of a control system is to take a human out of the loop. That said, a control system will generally allow an operator to override the auto mode functionality by manually turning the pump on and off. However, the pump will still obey a certain set of safety interlocks, including the tank high level. Which brings me to my last point - a (good) PLC dev will also operate with the mentality of 'how do I make this system operator proof'. Operators are _Excellent_ at causing things to fail in strange and unexpected ways. Maybe they wanted the tank to be filled higher, so they might try and set the High and High-High level setpoints to >100% (which will never trigger because the tank will overflow at 100%). The dev needs to ensure that those limits are always valid, and so will limit the maximum setpoint to 100%. For these reasons, I really wouldn't put much effort into attacking an ICS from SCADA. If you wanted to actually overfill the tank, you need to attack the inputs to the system. It might be that you can find a way to force the system believe the tank is in a different state to what it actually is. If the tank relies solely on an analog level feedback, try and force the controller to believe the tank is always at say 50%, regardless of the actual tank level. Or, it might be there's a significant distance between the tank and the pumps, and they're controlled by different controllers. Intercept the communication stream between them, identify how the tank PLC is communicating the interlock to the Pump PLC and manipulate it there. Maybe there's a complex series of valves between the pump and the tank, find a way to manipulate the valve feedback such that the pump thinks it's pumping somewhere else. A succesful cyber attack will need to seek to sever the control system from reality.
@leonardab5042
@leonardab5042 2 жыл бұрын
this is a valid point, and I like the summary "..sever the controller from reality."
@estebandamiangutierrezmlot9182
@estebandamiangutierrezmlot9182 2 жыл бұрын
Could you share the source code of the project?
@Zygorg
@Zygorg 4 жыл бұрын
Hi John
@flipup556
@flipup556 4 жыл бұрын
Why do i think of the Beirut explosion after seeing this
@nonasuomynona1734
@nonasuomynona1734 4 жыл бұрын
Same
@8starsAND
@8starsAND 6 ай бұрын
Probably because you wasn’t the sharpest pencil in the pencil case if you know what I mean…
@anuradhalakruwan1918
@anuradhalakruwan1918 4 жыл бұрын
Windows 10 use ethical hac*king tutorial. 👍👍👍👍👍👍👍
@ARZ10198
@ARZ10198 4 жыл бұрын
flag{sub2john}
@airplane3198
@airplane3198 4 жыл бұрын
Lol
How the Best Hackers Learn Their Craft
42:46
RSA Conference
Рет қаралды 2,6 МЛН
Industrial Control System (ICS) and SCADA: Risks and Solutions
59:59
U.S. Energy Association
Рет қаралды 28 М.
黑的奸计得逞 #古风
00:24
Black and white double fury
Рет қаралды 24 МЛН
НИКИТА ПОДСТАВИЛ ДЖОНИ 😡
01:00
HOOOTDOGS
Рет қаралды 2,7 МЛН
啊?就这么水灵灵的穿上了?
00:18
一航1
Рет қаралды 71 МЛН
3 Levels of WiFi Hacking
22:12
NetworkChuck
Рет қаралды 2,1 МЛН
Building a Secure OT Network | SANS ICS Concepts
36:19
SANS ICS Security
Рет қаралды 25 М.
When you Accidentally Compromise every CPU on Earth
15:59
Daniel Boctor
Рет қаралды 862 М.
Where People Go When They Want to Hack You
34:40
CyberNews
Рет қаралды 2 МЛН
The Stuxnet Story: What REALLY happened at Natanz
37:38
OTbase
Рет қаралды 168 М.
Edward Snowden: How Your Cell Phone Spies on You
24:16
JRE Clips
Рет қаралды 18 МЛН
ICS Security Assessment Methodology, Tools & Tips
56:28
S4 Events
Рет қаралды 18 М.
How Are Factories HACKED? Let Me Show You. (ICS - THM)
22:46
Hox Framework
Рет қаралды 5 М.
黑的奸计得逞 #古风
00:24
Black and white double fury
Рет қаралды 24 МЛН