Out of Control - Demonstrating SCADA Device Exploitation
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the vulnerabilities of SCADA systems in oil and gas pipelines through this Black Hat USA 2013 conference talk. Delve into the components of pipeline control systems, learn about industrial protocols, and understand the potential consequences of unauthorized access. Discover various attack vectors, including application server and engineering workstation compromises, protocol exploitation, and direct memory access. Examine safety logic implementations and their complications. Gain insights into remediation strategies and witness a live exploit demonstration showcasing the potential for catastrophic failure. Understand the critical importance of securing SCADA devices in the context of America's growing oil and gas industry and the widespread distribution of volatile materials through populated areas.
Syllabus
Intro
Agenda
Components
So I've just owned an Application Server
So I've just owned an Engineering Workstation
Industrial Protocols
At the end of the day, it's all just bits
Just ask nicely
Complications • Control Engineers implement safety logic
Solutions
Spoofing
Direct Memory Access
Scanning
Remediation
Exploit Demo
Catastrophic Failure
Taught by
Black Hat
Related Courses
Penetration Testing - Discovering VulnerabilitiesNew York University (NYU) via edX The Complete Cyber Security Course : Network Security!
Udemy Certified Ethical Hacker دورة إعداد الـ
Udemy The Ethical Hacking Starter Kit: 12 Techniques
Udemy Technical Weakness Identification with Nikto
Pluralsight