YoVDO

Tape Loops for Industrial Control Protocols

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Ethical Hacking Courses Modbus Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore industrial control protocol vulnerabilities and attack techniques in this 50-minute conference talk from Circle City Con 2014. Delve into the intricacies of HMI systems, L2 and L3 networks, firewalls, and PLCs, with a focus on their inherent security flaws. Learn about Modbus functionality, application firewalls, and sniffing techniques. Discover the concept of "tape loops" for manipulating industrial protocols, and understand their potential impact on various systems. Examine the motivations behind exploiting these vulnerabilities and consider the broader implications for industrial cybersecurity.

Syllabus

Intro
The Outline
HMI
Other L2 Systems
What Lives on L3?
Firewalls
PLCs == Insecure By Design
Modicon Quantum
ControlLogix
Why Level 2?
Tofino Hardware
Types of Operation
How Modbus Works
The Problem in a Nutshell
Modbus Function Codes
Application Firewall
Ettercap
Sniff and Record
Timer Expiration
Overwrite: Engage
Modbus VCR: What you've got
Tape Loops
Modbus VCR: Sound Familiar?
Other protocols
The Gauntlet
Why Profit?
Okay, Profit!
Conclusion


Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network