Главная
Study mode:
on
1
Intro
2
About T1 Networks
3
ICS Architecture
4
ICS Security Advisory
5
ICS Tech Matrix
6
ICS Situation
7
Importance of ICS
8
Public vs Private ICS
9
Open Protocols
10
MP3 Protocol
11
Things Protocol
12
Demonstration
Description:
Explore common flaws in Industrial Control Systems (ICS) network protocols through this comprehensive conference talk from the Hack In The Box Security Conference. Dive into the analysis of six widely used ICS protocols in critical infrastructure sectors, including power, water, transportation, petroleum, and manufacturing. Learn about the potential risks associated with both public and private ICS protocols, and discover how attackers can exploit vulnerabilities to sniff traffic without encryption and perform command or response injection attacks on Programmable Logic Controllers (PLCs) without proper authentication. Witness four attack demonstrations showcasing the significant impacts of these common flaws on ICS security. Gain insights from cybersecurity experts Mars Cheng and Selmon Yang as they discuss the importance of balancing security concerns with operational requirements in ICS environments. Explore topics such as ICS architecture, security advisories, technology matrices, and the current state of ICS security. Understand the crucial role of ICS in critical infrastructure operations and the challenges faced when implementing public and private protocols. Read more

Common Flaws in ICS Network Protocols

Hack In The Box Security Conference
Add to list