Главная
Study mode:
on
1
Intro
2
About Me
3
HMI
4
Modbus op codes
5
Modbus Protocol
6
Sixnet Universal Protocol
7
Reversing
8
Blinkenlights
9
Telnet, FTP
10
Get File Descriptor
11
File manipulation
12
MURE SNIFFING!
13
Shell Commands
14
Pseudo-Shell
15
Furk Bamp
16
Reporting
17
CVE-2013-2802
18
Sixnet firmware 4.8
Description:
Explore SCADA communication vulnerabilities in this 28-minute conference talk from Louisville InfoSec 2013. Dive into topics such as HMI, Modbus protocols, Sixnet Universal Protocol, and reverse engineering techniques. Learn about blinkenlights, Telnet, FTP, file manipulation, and MURE sniffing. Discover shell commands, pseudo-shells, and the Furk Bamp tool. Gain insights into reporting practices and understand the implications of CVE-2013-2802 for Sixnet firmware 4.8. Enhance your knowledge of industrial control system security and potential attack vectors in SCADA environments.

Breaking SCADA Communications

Add to list