Главная
Study mode:
on
1
Intro
2
Overview
3
The PLC
4
Stuxnet
5
Engineering Workstation
6
S7 1500
7
S7 1200
8
S7 Protocol
9
S7 Ring
10
Program Cycle Object
11
Two Simple Programs
12
Malicious Program
13
Legal Flow
14
Description
15
Setup Phase
16
Raw Engineering Station
17
Conclusion
18
Cryptographic Primitive
19
PLC Public Key
20
PLC Ring
21
Reverse Engineering Tips
22
Runtime Type Information
23
Demonstration
Description:
Explore a comprehensive analysis of security vulnerabilities in Siemens industrial control systems, focusing on Simatic S7 PLCs and their communication with engineering stations and SCADA HMIs. Delve into the architecture's claimed security measures against sophisticated attacks, and uncover how even the latest versions remain susceptible to exploitation. Examine the S7 protocol, program cycle objects, and cryptographic primitives used in these systems. Learn about reverse engineering techniques, runtime type information, and witness a demonstration of potential attack vectors. Gain insights into the implications of these vulnerabilities for industrial cybersecurity and the ongoing challenges in securing critical infrastructure against evolving threats.

Rogue7 - Rogue Engineering-Station Attacks on S7 Simatic PLCs

Black Hat
Add to list