Главная
Study mode:
on
1
Intro
2
INTRODUCTION
3
PROJECT ORIGIN
4
PROJECT GOALS
5
PLC - MICROLOGIX 1400
6
PLC - KEYSWITCH STATES
7
PLC - COMMUNICATION PROTOCOLS
8
PLC - PCCC STRUCTURE
9
PLC - PROTOCOL RESOURCES
10
PLC - DEVICE CONFIGURATION
11
ENABLING SNMP - REASONS & REQUIREMENTS
12
ENABLING SNMP - RSLOGIX
13
ENABLING SNMP - GET CURRENT CONFIG
14
ENABLING SNMP – PROTOCOL BITFIELD
15
ENABLING SNMP – CRC ERRORS
16
ENABLING SNMP – REBUILD CONFIG
17
ENABLING SNMP – WRITE CONFIG
18
ENABLING SNMP - SUCCESS INDICATOR
19
REBOOTING THE PLC - REASONS & REQUIREMENTS
20
REBOOTING THE PLC - BASIC FUZZING
21
REBOOTING THE PLC - E8FF CRASH
22
REBOOTING THE PLC - CRASH RECOVERY
23
MEMORY MODULE - REASONS & REQUIREMENTS
24
MEMORY MODULE - LOAD ON ERROR PCCC Protected Typed Logical Write with Three Address Fields
25
MEMORY MODULE - WRITE NEW CONFIG
26
MEMORY MODULE - CONFIG VERIFICATION
27
MEMORY MODULE - STORE PROGRAM
28
ATTACK SO FAR
29
MODIFIED FIRMWARE - CREATION
30
FLASHING FIRMWARE - SNMP BACKDOOR
31
FLASHING FIRMWARE - SNMP REBOOT
32
FLASHING FIRMWARE - TFTP
33
FLASHING FIRMWARE - UPDATE PROCESS
34
FLASHING FIRMWARE - SUCCESS
35
IMPACT
36
MITIGATION - RECOMMENDATIONS
37
MITIGATION - SPECIAL RECOMMENDATIONS
38
ADDITIONAL RESOURCES
Description:
Explore the vulnerabilities of Programmable Logic Controllers (PLCs) in industrial settings through this conference talk. Delve into the methodologies used to discover security flaws in a well-known PLC, and learn how combining seemingly minor vulnerabilities can lead to complete device takeover. Gain insights into the MicroLogix 1400 PLC, its communication protocols, and configuration processes. Understand the steps involved in enabling SNMP, rebooting the PLC, and manipulating the memory module. Discover techniques for creating and flashing modified firmware, including the use of SNMP backdoors and TFTP. Assess the potential impact of these vulnerabilities and explore recommended mitigation strategies. Benefit from the expertise of Jared Rittle, a security researcher with Cisco Talos, as he shares his findings on embedded systems in Industrial Control Systems (ICS), Supervisory Control and Data Acquisition (SCADA), and Internet of Things (IoT) devices.

Process Control Through Counterfeit Comms - Using and Abusing Built-In Functionality to Own a PLC

0xdade
Add to list
0:00 / 0:00