DEF CON 30 - Sharon Brizinov - Evil PLC Attacks - Weaponizing PLCs

  Рет қаралды 23,530

DEFCONConference

DEFCONConference

Күн бұрын

Пікірлер: 29
@willemvdk4886
@willemvdk4886 Жыл бұрын
Much, much respect. There is a LOT of work in that 10 seconds he spent on telling us about the protocol reversing. Incredible.
@arbibenmaatoug5566
@arbibenmaatoug5566 22 күн бұрын
very impressive , big applause , respect , can't find words to congratulate you bro. nice feeling after all . our adrenaline ,our joy.
@halo37253
@halo37253 2 жыл бұрын
Sad to see the two biggest PLC Vendors main product lines missing. Rockwell with Studio5000 and Control Logix or Compact Logix Siemens with TIA Portal and S7 1200 or 1500. They have a Cheap modern Micrologix with CCW, which no one uses. I think the only thing CCW is used for by most engineers is to configure Power Flex Drives if not using drive tools.
@CrIMeFiBeR
@CrIMeFiBeR Жыл бұрын
Really intrested in siemens exploitation
@ivanv754
@ivanv754 Жыл бұрын
Well those are very very expensive and you kind of need a service contract to fully use
@peterevenhuis2663
@peterevenhuis2663 Жыл бұрын
Good that you totally missed Siemens, now I can sleep better
@chebhou
@chebhou Жыл бұрын
I was looking for it too 🤣
@Mekkor
@Mekkor Жыл бұрын
They technically missed Allen-Bradley as well as they only covered Micro800s with Connected Components Workbench, which is free licensing.
@johnmhedges
@johnmhedges Жыл бұрын
Most IDEs don't load the source code to the PLC unless the programmer downloads it or enables the feature in the programming environment.
@SALTINBANK
@SALTINBANK 2 жыл бұрын
Great talk from unit 8200 !)
@tommyhuffman7499
@tommyhuffman7499 Жыл бұрын
A more advanced explanation of how PLC's work. Love it!!
@Jeeperanthony
@Jeeperanthony 2 жыл бұрын
Really cool! I assume you could put a flag in that would allow authorized personnel (through MAC, IP, etc) to upload.
@NickMoore
@NickMoore Жыл бұрын
That was awesome!
@ChristoffelTensors
@ChristoffelTensors Жыл бұрын
Bro is the RTFM gigaCHAD
@lassorb4752
@lassorb4752 Жыл бұрын
What about Siemens?
@MrGillb
@MrGillb Жыл бұрын
I wonder how many people bricked PLCs due to the confusing ass nomenclature
@johnkost2514
@johnkost2514 Жыл бұрын
Just a replay of Stuxnet, and from well, I'll just leave it at that..
@DeShark88
@DeShark88 Жыл бұрын
It's err.. nothing like Stuxnet. What are you on about? It involves PLCs, sure, but the method and outcome is totally different.
@johnkost2514
@johnkost2514 Жыл бұрын
@@DeShark88 it's an insertion attack. Stuxnet modified the Step7/WinCC DLL(s). The payloads and focus was on DLL(s).
@DeShark88
@DeShark88 Жыл бұрын
@@johnkost2514 the attack vector was totally different. One was an OS 0-day (Windows Shortcuts) exploited via USB stick, and the other is via a honeypot. Also the target was different. In Stuxnet the target was the PLCs, in this attack the target is those trying to hack PLCs. Sure, the PLC programmer's DLLs were edited in both cases, but I wouldn't call this a simple replay, since it's being done the opposite way around to target the complete opposite target.
@johnkost2514
@johnkost2514 Жыл бұрын
@@DeShark88 there were multiple Stuxnet campaigns (versions) and the probability that all were delivered via a USB is suspect. Again, DLL(s) were the focus of the exploit. Anyone who really knows the deeper constructs of ICS security and vulnerability would acknowledge the similarities. Relax your ego. I made an observation, I stated the similarity. Cyber researchers generally have more open minds than you do.
@cesar.automacao
@cesar.automacao Жыл бұрын
Wow :p
@TheEndermanOfEvil
@TheEndermanOfEvil 2 жыл бұрын
fuck yeah, thats dope as
@bahadirm
@bahadirm Жыл бұрын
Dude, people hacking an exposed PLC found on Shodan with possibly propriety IDE/Developement Software that they had most likely need to pay for, are not script kiddies.
@mlu5653
@mlu5653 Жыл бұрын
You think they paid for it?...xD
@bahadirm
@bahadirm Жыл бұрын
@@mlu5653 depends on the IDE and their implementation of software/dongle licensing.
@prometheuscubesystems4399
@prometheuscubesystems4399 Жыл бұрын
yeah he think them r paying kkk
@jeremydaniels1973
@jeremydaniels1973 Жыл бұрын
I was excited when I read the title but let down by the execution of this presentation..
@DeShark88
@DeShark88 Жыл бұрын
What were you let down by? The content of the presentation was excellent in my opinion.
Зу-зу Күлпаш 2. Интернет мошенник
40:13
ASTANATV Movie
Рет қаралды 558 М.
小丑家的感情危机!#小丑#天使#家庭
00:15
家庭搞笑日记
Рет қаралды 30 МЛН
规则,在门里生存,出来~死亡
00:33
落魄的王子
Рет қаралды 31 МЛН
Hacking the Hackers: The Art of Compromising C2 Servers with Vangelis Stykas
34:39
THE UNTOLD STORY: How the PIX Firewall and NAT Saved the Internet
21:50
The Serial Port
Рет қаралды 395 М.
Plain Text - Dylan Beattie - NDC Copenhagen 2022
59:20
NDC Conferences
Рет қаралды 165 М.
Hunting for ICS and Other Tricks on Shodan!
25:20
Cody Bernardy
Рет қаралды 15 М.
Зу-зу Күлпаш 2. Интернет мошенник
40:13
ASTANATV Movie
Рет қаралды 558 М.