Главная
Study mode:
on
1
Intro
2
INTRODUCTION
3
PROJECT ORIGIN
4
PROJECT GOALS
5
PLC - MICROLOGIX 1400
6
PLC - KEYSWITCH STATES
7
PLC - COMMUNICATION PROTOCOLS
8
PLC - PCCC STRUCTURE
9
PLC - DEVICE CONFIGURATION
10
ENABLING SNMP - REASONS & REQUIREMENTS
11
ENABLING SNMP - GET CURRENT CONFIG
12
ENABLING SNMP - REBUILD CONFIG
13
REBOOTING THE PLC - REASONS & REQUIREMENTS
14
REBOOTING THE PLC - CRASH RECOVERY
15
MEMORY MODULE - REASONS & REQUIREMENTS
16
MEMORY MODULE - LOAD ON ERROR
17
MEMORY MODULE - WRITE NEW CONFIG
18
MEMORY MODULE - CONFIG VERIFICATION
19
MEMORY MODULE - STORE PROGRAM
20
MODIFIED FIRMWARE - CREATION
21
FLASHING FIRMWARE - SNMP BACKDOOR
22
FLASHING FIRMWARE - SNMP REBOOT
23
IMPACT
Description:
Explore the vulnerabilities of Programmable Logic Controllers (PLCs) in industrial settings through this BruCON Security Conference talk. Delve into the investigation of a well-known PLC, uncovering methodologies for discovering weaknesses and demonstrating how combining minor vulnerabilities can lead to complete device takeover. Learn about PLC communication protocols, device configuration, and the potential risks associated with SNMP enablement. Discover techniques for rebooting PLCs, manipulating memory modules, and creating modified firmware. Gain insights into the impact of these vulnerabilities on industrial control systems and the importance of securing critical infrastructure against malicious actors.

Process Control through Counterfeit Comms

BruCON Security Conference
Add to list
0:00 / 0:00