Главная
Study mode:
on
1
Intro
2
The Outline
3
HMI
4
Other L2 Systems
5
What Lives on L3?
6
Firewalls
7
PLCs == Insecure By Design
8
Modicon Quantum
9
ControlLogix
10
Why Level 2?
11
Tofino Hardware
12
Types of Operation
13
How Modbus Works
14
The Problem in a Nutshell
15
Modbus Function Codes
16
Application Firewall
17
Ettercap
18
Sniff and Record
19
Timer Expiration
20
Overwrite: Engage
21
Modbus VCR: What you've got
22
Tape Loops
23
Modbus VCR: Sound Familiar?
24
Other protocols
25
The Gauntlet
26
Why Profit?
27
Okay, Profit!
28
Conclusion
Description:
Explore industrial control protocol vulnerabilities and attack techniques in this 50-minute conference talk from Circle City Con 2014. Delve into the intricacies of HMI systems, L2 and L3 networks, firewalls, and PLCs, with a focus on their inherent security flaws. Learn about Modbus functionality, application firewalls, and sniffing techniques. Discover the concept of "tape loops" for manipulating industrial protocols, and understand their potential impact on various systems. Examine the motivations behind exploiting these vulnerabilities and consider the broader implications for industrial cybersecurity.

Tape Loops for Industrial Control Protocols

Add to list
0:00 / 0:00