Главная
Study mode:
on
1
Introduction
2
What are OT networks
3
Getting to OT networks
4
Attack vectors
5
Introduction to PLCs
6
PLC Blocks
7
Leather Logic
8
Frequency
9
Letter Logic
10
Receiving
11
Receiving Data
12
Detection
13
Questions
14
Power surges
15
PLC modes
16
CPU utilization
17
PLC CPU utilization
18
PLC noise
19
disturbances on other instructions
20
testing other instructions
21
whats producing the AM directing
22
reading data from 1m
23
better antenna
24
better result
25
outdated software
26
passive monitoring
27
reverse engineering
Description:
Explore a Black Hat conference talk that delves into the scenario of an attacker compromising air-gapped industrial control systems (ICS) and SCADA networks using autonomous malware. Learn about reconnaissance techniques used to discover network topology, identify specific industrial devices, and potentially extract sensitive intellectual property. Understand the intricacies of programmable logic controllers (PLCs), including PLC blocks, leather logic, and frequency manipulation. Discover various attack vectors, data exfiltration methods, and detection techniques. Examine the impact of power surges, PLC modes, and CPU utilization on these systems. Investigate passive monitoring, reverse engineering, and the challenges of outdated software in ICS/SCADA environments. Gain insights into the potential vulnerabilities of critical infrastructure and the sophisticated methods employed by threat actors targeting air-gapped networks.

Exfiltrating Reconnaissance Data from Air-Gapped ICS - SCADA Networks

Black Hat
Add to list