Главная
Study mode:
on
1
Intro
2
Industrial Control Systems aka SCADA
3
Cyber-physical systems
4
Cyber-physical hack
5
Control equipment vulnerabilities
6
ICS-CERT recommendation
7
TCP/IP based communication
8
Hear is the plant. What is the plan?
9
Timing of the DoS attack
10
Impact evaluation
11
Process control automation
12
PLC Internals
13
Control logic
14
Interlocks
15
PID control
16
Time constants
17
Process control vulnerability
18
PLC cannot do it alone
19
Operator is not almighty
20
Why to attack ICS
21
Attack payload
22
What can be done to the process
23
Attack considerations
24
Production damage attack
25
Plants for sale
26
Hacking Chemical Plant for Competition & Extortion
27
Stages of SCADA attack
28
Traditional IT hacking
29
Modern IT hacking
30
Know the equipment
31
Process discovery
32
Espionage
33
Max economic damage?
34
Understanding control structure
35
Control loop configuration
36
Understanding points and logic
37
Physics of process control
38
Process interdependencies
39
Understanding process response
40
Control loop ringing
41
Process control challenges
42
Types of attacks
43
Outcome of the control stage
44
Alarm propagation
45
Fingerprints of plant dynamic behavior
46
How to break things?
47
Catalyst killers
48
Hacker unfriendly process
49
Measuring the process
50
Technician vs. engineer
51
Technician answer
52
Quest for engineering answer
53
Outcome of the damage stage
54
Creating forensics footprint
55
Defeating chemical forensics
56
Data synchronization and processing
Description:
Explore a comprehensive analysis of cyber-physical attacks on industrial control systems in this conference talk from the Hack In The Box Security Conference. Delve into the intricacies of hacking chemical plants for competition and extortion, following a simulated Vinyl Acetate production plant attack scenario. Learn about the stages of cyber-physical attacks, from initial reconnaissance to final execution, and understand the challenges attackers face in manipulating industrial processes. Gain insights into the potential economic damage of such attacks and their implications for manufacturers and extortionists. Examine the intersection of IT and OT security, including vulnerabilities in SCADA systems, PLC internals, and process control automation. Discover defense strategies, detection opportunities, and process hardening techniques from both attacker and defender perspectives. Understand the significance of recent APT attacks and malware like Havex in the context of targeted SCADA-hacking capabilities. Benefit from the speaker's extensive experience in ICS security, including hands-on demonstrations using the Damn Vulnerable Chemical Process framework. Read more

Hacking Chemical Plants for Competition and Extortion

Hack In The Box Security Conference
Add to list