Главная
Study mode:
on
1
Intro
2
Process Automation
3
What we do with much more complex control loops?
4
Programmable Logic Controllers
5
Recent Attacks Against ICS
6
S7-1200 V4 PLC HARDWARE - SOC DECAP
7
S7-1200 v4 Closer Look
8
M25P40/ Serial Flash Embedded Memory (bootloader)
9
S7-1200 Specs, 3D X-Ray Tomography
10
Siemens Firmware Components
11
Execution Mode Stack in S7-1200 v4
12
ADONIS MPU Configuration at 0x000400B4
13
Siemens Firmware Boot Process
14
ADONIS Kernel
15
Firmware Update Process On S7 PLC
16
Decompressed Firmware Update File Structure
17
Undocumented HTTP Handlers
18
Special Access Feature
19
Primary Handlers After Handshake
20
x80 Handler, Update Mode Function
21
Ox1C Primary Handler
22
Siemens S7-1200 PLC Bootloader Arbitrary Code Execution
23
Conclusions and Future Works
Description:
Explore a comprehensive analysis of the security measures in Siemens S7 PLC series, focusing on firmware integrity verification and bootloader code. Delve into the intricate details of industrial automation components, examining recent attacks against Industrial Control Systems (ICS) and the S7-1200 V4 PLC hardware. Investigate the S7-1200 v4 architecture, including its SOC decapsulation, embedded memory, and 3D X-Ray tomography. Gain insights into Siemens firmware components, execution mode stack, and ADONIS MPU configuration. Understand the firmware boot process, update procedures, and undocumented HTTP handlers. Discover the special access features and primary handlers after handshake. Analyze the x80 handler, update mode function, and 0x1C primary handler. Learn about the Siemens S7-1200 PLC bootloader arbitrary code execution vulnerability. Conclude with future implications and potential areas for further research in industrial automation security.

Doors of Durin - The Veiled Gate to Siemens S7 Silicon

Black Hat
Add to list