Главная
Study mode:
on
1
Speaker and Talk Introduction
2
Pre-Research
3
Welcome To Hell The World Of Bytes And Bits
4
Reverse Engineering Eye-Gineering
5
M Protocol
6
M Protocol vs PCAP
7
PCAP vs Manual
8
M Protocol vs Manual
9
Preliminary results
10
Research
11
Results
12
Vulnerabilities
13
Do's & Demo
14
Conclusion
Description:
Explore the intricacies of hacking Mitsubishi PLCs without firmware access in this illuminating conference talk by Anton Dorfman at Nullcon Goa 2023. Delve into the challenges of reverse engineering proprietary network protocols, from initial research to vulnerability discovery. Learn about innovative techniques used to reconstruct the protocol, including documentation analysis, error code examination, vendor utility exploration, and PLC simulation. Gain insights into the discovered vulnerabilities, with a focus on CVE-2022-25161 and CVE-2022-25162. Witness a live demonstration showcasing the potential impact of these vulnerabilities on industrial systems. Perfect for security researchers and professionals interested in industrial control system security and firmware analysis.

Hacking Mitsubishi PLC Without Access To Firmware

nullcon
Add to list