Tape Loops for Industrial Control Protocols
Offered By: YouTube
Course Description
Overview
Explore industrial control protocol vulnerabilities and attack techniques in this 50-minute conference talk from Circle City Con 2014. Delve into the intricacies of HMI systems, L2 and L3 networks, firewalls, and PLCs, with a focus on their inherent security flaws. Learn about Modbus functionality, application firewalls, and sniffing techniques. Discover the concept of "tape loops" for manipulating industrial protocols, and understand their potential impact on various systems. Examine the motivations behind exploiting these vulnerabilities and consider the broader implications for industrial cybersecurity.
Syllabus
Intro
The Outline
HMI
Other L2 Systems
What Lives on L3?
Firewalls
PLCs == Insecure By Design
Modicon Quantum
ControlLogix
Why Level 2?
Tofino Hardware
Types of Operation
How Modbus Works
The Problem in a Nutshell
Modbus Function Codes
Application Firewall
Ettercap
Sniff and Record
Timer Expiration
Overwrite: Engage
Modbus VCR: What you've got
Tape Loops
Modbus VCR: Sound Familiar?
Other protocols
The Gauntlet
Why Profit?
Okay, Profit!
Conclusion
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network