Главная
Study mode:
on
1
Intro
2
Who Am I
3
Agenda
4
ICS Devices
5
Glossary
6
Typical ICS Deployment
7
Modbus
8
DNP
9
Big Threats
10
ICS vs IT Security
11
Pure Numbers
12
Internetfacing
13
Water Pump
14
Control Units
15
The Environment
16
What does the attacker see
17
New Architecture
18
Tools
19
Vulnerability Overview
20
What is an Attack
21
Attack Statistics
22
NonCritical Attacks
23
Critical Attacks
24
Automated Attacks
25
Attacks
26
snort
27
Decoy Doc
28
Dump Files
29
Execution
30
APT1 Report
31
Contact Information
32
Attribution Framework
33
Beef
34
The Targeted Attack
35
Attacker Profile
36
Recommendations
37
USB Lockdown
38
Questions
39
Question 1 Modbus
Description:
Explore the world of Industrial Control System (ICS) security in this Black Hat USA 2013 conference talk. Delve into the findings of a robust ICS honeynet, uncovering the true nature of attacks on critical infrastructure devices. Learn about the profiles, intelligence, and identities of attackers who exploited the honeynet environment. Witness a live demonstration of attackers exfiltrating perceived sensitive data. Discover surprising and substantial findings that challenge common assumptions in the ICS community. Gain insights into geo-location techniques used to track attacker movements, operations, and attacks. Examine new statistics and attack details exclusive to this presentation. Understand the differences between ICS and IT security, explore typical ICS deployments, and learn about protocols like Modbus and DNP. Analyze vulnerability overviews, attack statistics, and the distinction between critical and non-critical attacks. Investigate tools and techniques used in ICS security, including snort and decoy documents. Dive into the attribution framework and explore recommendations for improving ICS security, including USB lockdown measures. Read more

The SCADA That Didn't Cry Wolf - Who's Really Attacking Your ICS Devices

Black Hat
Add to list
0:00 / 0:00