Главная
Study mode:
on
1
Intro
2
Agenda
3
Components
4
So I've just owned an Application Server
5
So I've just owned an Engineering Workstation
6
Industrial Protocols
7
At the end of the day, it's all just bits
8
Just ask nicely
9
Complications • Control Engineers implement safety logic
10
Solutions
11
Spoofing
12
Direct Memory Access
13
Scanning
14
Remediation
15
Exploit Demo
16
Catastrophic Failure
Description:
Explore the vulnerabilities of SCADA systems in oil and gas pipelines through this Black Hat USA 2013 conference talk. Delve into the components of pipeline control systems, learn about industrial protocols, and understand the potential consequences of unauthorized access. Discover various attack vectors, including application server and engineering workstation compromises, protocol exploitation, and direct memory access. Examine safety logic implementations and their complications. Gain insights into remediation strategies and witness a live exploit demonstration showcasing the potential for catastrophic failure. Understand the critical importance of securing SCADA devices in the context of America's growing oil and gas industry and the widespread distribution of volatile materials through populated areas.

Out of Control - Demonstrating SCADA Device Exploitation

Black Hat
Add to list