Главная
Study mode:
on
1
Intro
2
Insecure-by-design is a well-known issue, why revisit it?
3
Example: Segmentation & Hardening
4
Siemens WinCC OA SCADA (CVE-2022-33139)
5
Saia Burgess PG5 PCD PLC
6
Nuance: Supply Chains & Collisions
7
Example: ProConOS runtime
8
Nuance: Firmware Updates
9
Example: Emerson DeltaV DCS
10
Example: Honeywell Safety Manager (SC) SIS
11
Example: Emerson ControlWave PLC/RTU
12
Example: Honeywell Safety Manager SIS
13
Reverse Engineering
14
Mitigations
15
Conclusions
Description:
Explore the persistent challenges of insecure-by-design practices in Operational Technology (OT) devices and protocols in this comprehensive conference talk from the Hack In The Box Security Conference. Delve into dozens of previously undisclosed issues affecting products from nearly 20 vendors across various industrial sectors. Gain insights into the quantitative overview of these vulnerabilities, ranging from security-certified products with inherent design flaws to unsuccessful attempts at improvement. Examine how the opacity and proprietary nature of OT systems, coupled with suboptimal vulnerability management and potentially misleading security certifications, complicate risk management efforts. Through technical deep-dives, understand how attackers can achieve remote code execution on critical Level 1 devices using only intended functionality, and consider the defensive implications. Analyze quantitative data on the research process, providing valuable information on the resources required to develop basic offensive capabilities and their potential impact on the threat landscape. Read more

ICEFALL - Revisiting A Decade Of OT Insecure-By-Design Practices

Hack In The Box Security Conference
Add to list