Главная
Study mode:
on
1
Intro
2
Agenda
3
Vxworks
4
Digital Forensics
5
How has ICS affected
6
ICS Anomaly
7
Forensic Evidence
8
Control System Devices
9
Physical Data
10
Shells
11
Main Shell
12
Running Configuration
13
Wireshark
14
No Memory
15
Seashell
16
Memory
17
Windows Reverse Engineer
18
Solution
19
Cool Features
20
Demo
21
Projects
22
Future Plans
23
Arktech
24
Digital Data
25
Example
26
Research
27
Use Case
Description:
Explore the fundamentals of Digital Forensics and Incident Response (DFIR) for Industrial Control Systems (ICS) in this 25-minute Black Hat conference talk. Delve into the world of embedded devices used in critical infrastructure, focusing on Programmable Logic Controllers (PLCs), Remote Terminal Units (RTUs), and controllers. Learn about the files, firmware, memory dumps, physical conditions, and other data that can be analyzed in embedded systems to determine root causes of compromises or misoperations. Examine practical examples of forensic data collection from two popular RTUs used in Electric Substations: the General Electric D20MX and the Schweitzer Engineering Labs SEL-3530 RTAC. Gain insights into VxWorks, ICS anomalies, forensic evidence gathering, and various shells used in control system devices. Discover techniques for analyzing running configurations, using Wireshark, and performing memory analysis. The talk also covers Windows reverse engineering, cool features, and future plans for ICS DFIR, providing a comprehensive overview of this critical field in cybersecurity. Read more

What's the DFIRence for ICS?

Black Hat
Add to list
0:00 / 0:00