Greetings from the '90s: Exploiting the Design of Industrial Controllers in Modern Settings

  Рет қаралды 5,470

Black Hat

Black Hat

Күн бұрын

...In this talk we will introduce a novel exploitation vector, one previously unconsidered in existing works. More specifically, we will show how PLC programming practices, user APIs, and memory allocation for function blocks from the Library Functions open the door to automated enumeration of PLC control logic, identification of key infrastructure configuration parameters and process control variables, and their consequent targeted manipulation to achieve a desired attack impact. Additionally, allocated but unused memory can be applied to the establishment of covert C2 channels, from which attackers are afforded with the ability to run standard security tools, exfiltrate data and execute high-precision cyber-physical attacks on previously inaccessible network segments...
By: Marina Krotofil & Ric Derbyshire
Full Abstract: www.blackhat.c...

Пікірлер
ReCertifying Active Directory Certificate Services
40:19
Black Hat
Рет қаралды 6 М.
Quando eu quero Sushi (sem desperdiçar) 🍣
00:26
Los Wagners
Рет қаралды 15 МЛН
coco在求救? #小丑 #天使 #shorts
00:29
好人小丑
Рет қаралды 120 МЛН
Mom Hack for Cooking Solo with a Little One! 🍳👶
00:15
5-Minute Crafts HOUSE
Рет қаралды 23 МЛН
VIP ACCESS
00:47
Natan por Aí
Рет қаралды 30 МЛН
Breaking the x86 Instruction Set
44:29
Black Hat
Рет қаралды 362 М.
HTTP/2: The Sequel is Always Worse
35:15
Black Hat
Рет қаралды 6 М.
Hacking the Wireless World with Software Defined Radio - 2.0
1:02:19
How Smartcard Payment Systems Fail
58:56
Black Hat
Рет қаралды 156 М.
GOD MODE UNLOCKED - Hardware Backdoors in x86 CPUs
51:00
Black Hat
Рет қаралды 310 М.
Arm'd and Dangerous
37:38
Black Hat
Рет қаралды 6 М.
CQTools: The New Ultimate Hacking Toolkit
1:01:55
Black Hat
Рет қаралды 178 М.
Quando eu quero Sushi (sem desperdiçar) 🍣
00:26
Los Wagners
Рет қаралды 15 МЛН