Langner's Stuxnet Deep Dive

  Рет қаралды 66,686

S4 Events

S4 Events

8 жыл бұрын

Ralph Langner provides the most detailed presentation of the Stuxnet S7 code. He goes through the key Function Codes and Data Blocks in detail and shows how it matches to the Natanz facility. You see Ralph's teams comments throughout the Stuxnet code, and the level of detailed analysis.
This performance from S4x12 is a great example of the technical detail we look for in a Stage 2: Technical Deep Dive Session. The beauty of Ralph's presentation is he also makes the key points understandable for a less technical viewer.
This video from S4x12 was viewed 38K times on Vimeo before we moved it to this KZbin Channel.

Пікірлер: 66
@BillKinsman
@BillKinsman 3 жыл бұрын
This is the most fascinating piece of code that I have ever heard of. The authors had access to the most detailed information that there is and so much confidential information from so many vendors that it has to be state-sponsored.
@S4Events
@S4Events 3 жыл бұрын
Glad you enjoyed it!
@notme4526
@notme4526 2 жыл бұрын
It's all but been directly admitted by our security community because there clearance won't allow them to admit it publicly, though a lot of people involved or that over seen it basically admitted too it years ago. Even Obama got shocked on stage an said he couldn't speak about it when he was asked, notice he didn't say they weren't involved lol so he didn't lie, just that he could speak about it. On top of the fact that only governments would want to do this, any financially motivated group would have no interest in attacking Iran or investing the money to reverse the Siemens hardware, there was little to no research on this hardware back when stuxnet was used unlike now where there is much more public analysis and research of these products available online.
@jacobreuter
@jacobreuter Жыл бұрын
Absolutely my favorite explanation. I was looking for a deeper dig into the code such as this instead of the super dramatized videos with edits.
@S4Events
@S4Events Жыл бұрын
Yes. We point to this as an example of a great S4 Stage 2: Technical Deep Dive session for new Stage 2 speakers. Lots of technical meat that drives to a point. It has had over 50K views on KZbin, and for the first five years was on Vimeo. BTW, 60 Minutes came down to film footage of Ralph giving this session.
@ArztvomDienst
@ArztvomDienst Жыл бұрын
"Countdown to ZeroDay" made me come here. Fascinating talk!
@BillKinsman
@BillKinsman 3 жыл бұрын
Absolutely, the Field Engineer's worst nightmare! Trying to figure out why the rotors were failing must have been keeping some people awake at night.
@spacegerrit9499
@spacegerrit9499 3 жыл бұрын
Engineers got killed, reprimanded by management, fired and whatnot. Stuxnet had a huge impact on, not just machinery, but peoples lives.
@CristobalRuiz
@CristobalRuiz 4 жыл бұрын
I wonder who gave thumbs down? This is a great presentation.
@shreddagorge
@shreddagorge 4 жыл бұрын
Maybe some Iranians... ;-)
@PIFFthePUFF420
@PIFFthePUFF420 3 жыл бұрын
Maybe Mossad doesn't like you exposing their work
@tobalaba
@tobalaba 3 жыл бұрын
Mossad, NSA, or Langner competitors.
@ig_jr4843
@ig_jr4843 3 жыл бұрын
Thanks for sharing this outstanding presentation!
@invntiv
@invntiv 8 жыл бұрын
Very fascinating talk from one of the few people who were embroiled in understanding the stuxnet attack. Would love to here from Andrew Chien from Symantec as well. Langber, Chien, and many other involved were featured the brilliant 2016 documentary "Zero Day" by Alex Gibney. I urge those interested in forensics, security, or really any other STEM field to check it out
@invntiv
@invntiv 8 жыл бұрын
*** Eric Chien from Symantec
@asswhole4195
@asswhole4195 4 жыл бұрын
Check out the book "Countdown to Zeroday"
@tammyroyce8013
@tammyroyce8013 Жыл бұрын
Batch files are most commonly known to be in the system part C
@GeorgeTsiros
@GeorgeTsiros Ай бұрын
I like how the decompiled code still uses windows type names: BOOL DWORD etc
@ArztvomDienst
@ArztvomDienst Жыл бұрын
Love the HB Gary reference! XD
@chadkrause6574
@chadkrause6574 3 жыл бұрын
It seems very obvious that this was an inside job of some sort. The amount of information required to pull these attacks off is stunning. There had to be a team of people working on this
@ErebuBat
@ErebuBat 3 жыл бұрын
Not an inside job, but espionage. This is what the CIA does.... get info like this.
@spacegerrit9499
@spacegerrit9499 3 жыл бұрын
Dutch secret service was involved aswel. Apparantly the physical usb insertation was done by an AIVD mole.
@Evanderj
@Evanderj 2 жыл бұрын
The NSA can get inside practically anywhere in the world remotely. They had full access to the software on the system, the cctv, the whole network including the personal devices of many who worked there- thanks to Mossad for providing info & identities on those individuals. How intelligent and creative the NSA is… is just mind blowing- couple that with virtually unlimited funding.
@ArztvomDienst
@ArztvomDienst Жыл бұрын
Siemens was involved, they even build a functional sandbox cascade to recreate the real world conditions of the target, as Ralph says, even with the UF6
@AdamGreenhill
@AdamGreenhill 8 жыл бұрын
Is there a report or a writeup that details this? I would love to read this in PDF format
@S4Events
@S4Events 8 жыл бұрын
Langner's definitive work on Stuxnet is "To Kill A Centrifuge" www.langner.com/en/wp-content/uploads/2013/11/To-kill-a-centrifuge.pdf
@AdamGreenhill
@AdamGreenhill 8 жыл бұрын
S4 Events thanks!
@JeandrePetzer
@JeandrePetzer 2 жыл бұрын
28:45 Which dots is he talking about here? His laser pointer isnt showing up on the video? The bottom image doesnt have the missing dots that the first two real scada screens had
@wanderingfido
@wanderingfido 7 жыл бұрын
I wished someone had asked if they thought it was possible to consider a compromise where the input process image was not made immutable until the driver factory(s) were initialized at install-time. Oh well.
@tammyroyce8013
@tammyroyce8013 Жыл бұрын
How about stuxnet. And I I came out and I put and I open changed in Google speaker system that has been changed in the program itself because the program itself is actually written Google docs system to be exact
@tammyroyce8013
@tammyroyce8013 Жыл бұрын
The configuration system of the batch file
@allurbase
@allurbase Жыл бұрын
the numbers in red are censores for the video?? huh
@douro20
@douro20 8 жыл бұрын
So when will we have Felix Lindner's talk?
@S4Events
@S4Events 8 жыл бұрын
Felix was ill and sent hadez in his place. We are putting up two talks a week, so sometime in the next few weeks.
@angelabetts7359
@angelabetts7359 6 жыл бұрын
My master sent me here. ;)
@bizzybgful
@bizzybgful 5 жыл бұрын
I know
@discernunos2017
@discernunos2017 2 жыл бұрын
did they punish you for being a human too
@iGrave
@iGrave 2 жыл бұрын
44:30. Unfortunately there are "valid" reasons inputs could be writable. When testing code, it's common practice to put simulation routines to emulate plant equipment. It doesn't have to be complicated, oftentimes it's just reflecting an output "run" signal to a "running" input. For various reasons, it's desirable to write as close to raw input as possible. To be clear this code should 'never' make it to production, and if forgotten would typically be removed during commissioning. It's only something you'd ever see during dev, or perhaps for a digital twin/training rig. But hell. This sort of intentional exploit is just straight up not something I've never seen considered Even to this day. Spoken as a process control engineer with about 10 years experience across various industries.
@iGrave
@iGrave 2 жыл бұрын
Couple follow-ups from the q and a. I'm assuming old-mate at 55:10 ish is referring to what I mentioned above. I agree with the host here, I have never come across a situation where writing to the input tables is required *in production*. And for my example above, I have to doubt there is a solution the vendor could implement to allow us engineers for our sim purposes. I will disagree with the host about the authors of Stuxnet having an exact physical replica. Again, machines operate in predictable ways, which allows us to write sim code. If you see a run signal, put in some small delay, then reflect it back to the running input. The run speed feedback can ramp to the run speed setpoint according to some ramping rules. How machines and processes interact is more complicated, but I'm sure someone with a strong understanding of how a centrifuge cascade works could predict how the target plant would respond. Having a physical reproduction certainly wouldn't hurt though :)
@VacuumFluctuation
@VacuumFluctuation 2 жыл бұрын
It's wired to see even after 6 years S4 Events could not upload a proper FHD video of such a presentation as if it just does not matter.... Not sure what to call it - Arrogance or Carelessness?
@S4Events
@S4Events 2 жыл бұрын
I'm sorry about that. We did not record it that way back in 2012, so this is the best quality we have. Back then it was 60 people in a small room with a single, simple camera. Now the Main Stage is a 4 camera shoot with a lot more emphasis on staging and other elements for the video. I too regret we don't have a higher quality video. So of your two choices, carelessness back during the recording is the answer.
@VacuumFluctuation
@VacuumFluctuation 2 жыл бұрын
@@S4EventsI was so disappointed 5 days ago, i hope we had tech to upgrade the video atleast to 480p. But I do understand your response. Thanks for the reply.
@alexbenzie6585
@alexbenzie6585 6 ай бұрын
Why would it be arrogance you mug
@lagimmediafiles6478
@lagimmediafiles6478 5 жыл бұрын
The Code is C++? Or Java Script?
@lagimmediafiles6478
@lagimmediafiles6478 4 жыл бұрын
@Eduardo Souza whats that?
@hyperfine3633
@hyperfine3633 4 жыл бұрын
I thought it was largely written in C (with some assembly bit-fiddling)? Surely it would be almost impossible to keep track of a program this large writing just in an assembly language. Edit: Just seen the part about the C-style pseudo code. This is probably what I've seen before so I assumed it was mostly C code.
@moose43h
@moose43h 4 жыл бұрын
@Eduardo Souza no it was written in c and c++
@aslannoah9835
@aslannoah9835 3 жыл бұрын
@@moose43h The language is called SCL or Structured Text(ST). It is a PASCAL based language that's used for programming Programmable Logic Controllers
@OTbase
@OTbase 2 жыл бұрын
Folks, the high level code samples are translations from SCL to a C-like language in order to understand how the code is structured and what they intend to achieve. Those snippets were created manually and usually required a couple of days of work per SCL module (or function block/FB in Siemens parlance).
@24thelder72
@24thelder72 2 жыл бұрын
Shoot Don't Tell Us Nuclear Power Generation Use Read/Write Logic In Their Control System Design For Cooling. kdagPlymouthUK. Please Stay Blessed. GodBless S4.
@elimgarak3597
@elimgarak3597 3 жыл бұрын
6:48 geez, I guess Amazon and Google should stop using Apache, Spark, Nginx, Postgres, MongoDB, Linux, Bash, and other non-professional open source tools then. Boomer comment on an otherwise very cool talk.
@josefaschwanden1502
@josefaschwanden1502 3 жыл бұрын
How tf are these tools not professional?
@elimgarak3597
@elimgarak3597 3 жыл бұрын
@@josefaschwanden1502 I know right? I don't know why the speaker would imply that a tool is not professional because it is open source. BTW, I hope they upstreamed their enhancements with a pull request. Otherwise, a very dick move.
@josefaschwanden1502
@josefaschwanden1502 3 жыл бұрын
@@elimgarak3597 he didnt imply that open source means bad quality, but that this specific open source project was. Atleast thats how i understood it.
@urnan7499
@urnan7499 2 жыл бұрын
He never implied that open source means bad quality. He's referring to the open source decompiler that he used to decompile StuxNet. Professional anti virus companies use commercial tools like IDA Pro to decompile executables.
@elimgarak3597
@elimgarak3597 2 жыл бұрын
@@urnan7499 "we had to make a couple of enhancements BECAUSE it is open source and not really professionally mantained". Ofc he is implying open source means bad quality, that is clear as water.
@tammyroyce8013
@tammyroyce8013 Жыл бұрын
Did you check under stuxnet. EXE
@tammyroyce8013
@tammyroyce8013 Жыл бұрын
Stuxnet.exe Stuxnet.ini Stuxnet.rar
27c3: Adventures in analyzing Stuxnet
58:59
Christiaan008
Рет қаралды 7 М.
Dissecting Stuxnet
17:41
Stanford
Рет қаралды 148 М.
Inside Out Babies (Inside Out Animation)
00:21
FASH
Рет қаралды 19 МЛН
Jumping off balcony pulls her tooth! 🫣🦷
01:00
Justin Flom
Рет қаралды 24 МЛН
TRITON - Schneider Electric Analysis and Disclosure
25:52
S4 Events
Рет қаралды 12 М.
Stuxnet decoder Ralph Langner speaks about Stuxnet
1:04:37
Dawidh2011
Рет қаралды 86 М.
The Stuxnet Story: What REALLY happened at Natanz
37:38
OTbase
Рет қаралды 141 М.
Colossus - The Greatest Secret in the History of Computing
1:00:26
The Centre for Computing History
Рет қаралды 924 М.
Malware Analysis With Ghidra - Stuxnet Analysis
31:03
HackerSploit
Рет қаралды 61 М.
Radio Hacking: Cars, Hardware, and more! - Samy Kamkar - AppSec California 2016
51:12
Stuxnet TED talk 10 years ago: What I got completely wrong
31:01
#samsung #retrophone #nostalgia #x100
0:14
mobijunk
Рет қаралды 13 МЛН
АЙФОН 20 С ФУНКЦИЕЙ ВИДЕНИЯ ОГНЯ
0:59
КиноХост
Рет қаралды 1,2 МЛН
iPhone socket cleaning #Fixit
0:30
Tamar DB (mt)
Рет қаралды 17 МЛН
НОВЫЕ ФЕЙК iPHONE 🤯 #iphone
0:37
ALSER kz
Рет қаралды 351 М.