YoVDO

Debug7 - Leveraging a Firmware Modification Attack for Remote Debugging of Siemens S7 PLCs

Offered By: Black Hat via YouTube

Tags

Cybersecurity Courses Encryption Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a groundbreaking method for debugging Siemens S7 PLC firmware in this 37-minute Black Hat conference talk. Delve into the researchers' discovery of a vulnerability in Siemens' software PLC, ET 200SP, which allows for runtime modification and remote debugging of the S7-1500 firmware. Learn how the team exploited a forgotten debug flag to replace the encrypted SWCPU with an arbitrary ELF file, enabling remote control through an existing HTTP session. Discover the novel debugger developed by the researchers, capable of setting breakpoints, reading/writing memory, and persisting installation due to lack of secure boot. Understand the significant implications of this research for future studies on Siemens S7 PLCs and the potential security risks for remote attackers controlling the Windows VM. Gain insights from experts at the Technion, Israel Institute of Technology, as they present their findings on this critical vulnerability in industrial control systems.

Syllabus

Debug7: Leveraging a Firmware Modification Attack for Remote Debugging of Siemens S7 PLCs


Taught by

Black Hat

Related Courses

Internet History, Technology, and Security
University of Michigan via Coursera
Sicherheit im Internet
openHPI
أساسيات التشفير
Rwaq (رواق)
Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera
Web Application Development: Security
University of New Mexico via Coursera