Главная
Study mode:
on
1
Introduction
2
Who am I
3
Agenda
4
Theory ICS
5
Field Protocols
6
Field Devices
7
OPC
8
Key Detail Component Concepts
9
Simplified Scheme of Working
10
Screenshot
11
Internal Architecture
12
Sources
13
Research Scope
14
Hard Transmitter
15
Wired Transmitter
16
Hardware Tools
17
DTM Components
18
Lab
19
Oscilloscope
20
ICS Cursor
21
Atticus
22
DTM Vendors
23
Final Results
24
Vulnerability Distribution
25
Memory Corruptions
26
Other Flaws
27
XSS Scripting
28
Ignoring Standards
29
Developers are too lazy
30
Software quality
31
Remote code execution
32
Statistics
33
MDT Version 2
34
MDT Security
35
Conclusions
36
Links
37
Research
Description:
Explore the security vulnerabilities in Device Type Manager (DTM) components used in industrial control systems during this Black Hat conference talk. Dive into the complex architectures of ICS networks, focusing on FDT/DTM standardization for communication and configuration of field devices. Analyze components for hundreds of devices based on Modbus, HART, and Profibus DP protocols, uncovering insufficient data filtration, XSS, XXE, SSRF, DoS, and other security flaws. Gain insights into the research scope, vulnerability distribution, and statistics across various vendors. Learn about memory corruptions, remote code execution risks, and the implications of developers ignoring standards. Understand the critical importance of securing these components used in oil, gas, energy, nuclear, chemical, and other vital industries.

DTM Components - Shadow Keys to the ICS Kingdom

Black Hat
Add to list
0:00 / 0:00