Nakatomi Space - Lateral Movement as L1 Post-Exploitation in OT
Offered By: Hack In The Box Security Conference via YouTube
Course Description
Overview
Explore lateral movement techniques in Operational Technology (OT) networks through this conference talk from the Hack In The Box Security Conference. Delve into the vulnerabilities of Purdue Reference Model Level 1 (L1) devices like PLCs and DCS controllers, and understand how they can be exploited to bypass security perimeters in interfaced Basic Process Control System (BPCS) and Safety Instrumented System (SIS) architectures. Examine real-world BPCS/SIS architectures and 3rd party package unit setups, focusing on lateral movement options at the lowest Purdue levels. Witness an in-depth demonstration of a multi-stage exploit chain, featuring previously undisclosed authentication bypass and RCE vulnerabilities in a widely used PLC. Gain insights into hardening strategies to mitigate attacker lateral movement at the lowest Purdue levels, enhancing overall OT network security.
Syllabus
#HITB2023AMS D1T1 - Nakatomi Space: Lateral Movement As L1 Post-Exploitation In OT - Jos Wetzels
Taught by
Hack In The Box Security Conference
Related Courses
Основные методы обеспечения информационной безопасностиE-Learning Development Fund via Coursera Assessing the Security Posture of ICS Infrastructure Using ISA 62443 Standard
nullcon via YouTube The Internet of Insecure Things - 10 Most Wanted List
YouTube Attacking Electric Motors for Fun and Profit
Black Hat via YouTube Exfiltrating Reconnaissance Data from Air-Gapped ICS - SCADA Networks
Black Hat via YouTube