YoVDO

Out of Control - Demonstrating SCADA Device Exploitation

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses SCADA Courses Industrial Control Systems Courses Vulnerability Scanning Courses Spoofing Courses

Course Description

Overview

Explore the vulnerabilities of SCADA systems in oil and gas pipelines through this Black Hat USA 2013 conference talk. Delve into the components of pipeline control systems, learn about industrial protocols, and understand the potential consequences of unauthorized access. Discover various attack vectors, including application server and engineering workstation compromises, protocol exploitation, and direct memory access. Examine safety logic implementations and their complications. Gain insights into remediation strategies and witness a live exploit demonstration showcasing the potential for catastrophic failure. Understand the critical importance of securing SCADA devices in the context of America's growing oil and gas industry and the widespread distribution of volatile materials through populated areas.

Syllabus

Intro
Agenda
Components
So I've just owned an Application Server
So I've just owned an Engineering Workstation
Industrial Protocols
At the end of the day, it's all just bits
Just ask nicely
Complications • Control Engineers implement safety logic
Solutions
Spoofing
Direct Memory Access
Scanning
Remediation
Exploit Demo
Catastrophic Failure


Taught by

Black Hat

Related Courses

Penetration Testing - Discovering Vulnerabilities
New York University (NYU) via edX
The Complete Cyber Security Course : Network Security!
Udemy
Certified Ethical Hacker دورة إعداد الـ
Udemy
The Ethical Hacking Starter Kit: 12 Techniques
Udemy
Technical Weakness Identification with Nikto
Pluralsight