Breaking SCADA Communications
Offered By: YouTube
Course Description
Overview
Explore SCADA communication vulnerabilities in this 28-minute conference talk from Louisville InfoSec 2013. Dive into topics such as HMI, Modbus protocols, Sixnet Universal Protocol, and reverse engineering techniques. Learn about blinkenlights, Telnet, FTP, file manipulation, and MURE sniffing. Discover shell commands, pseudo-shells, and the Furk Bamp tool. Gain insights into reporting practices and understand the implications of CVE-2013-2802 for Sixnet firmware 4.8. Enhance your knowledge of industrial control system security and potential attack vectors in SCADA environments.
Syllabus
Intro
About Me
HMI
Modbus op codes
Modbus Protocol
Sixnet Universal Protocol
Reversing
Blinkenlights
Telnet, FTP
Get File Descriptor
File manipulation
MURE SNIFFING!
Shell Commands
Pseudo-Shell
Furk Bamp
Reporting
CVE-2013-2802
Sixnet firmware 4.8
Related Courses
Building Geospatial Apps on Postgres, PostGIS, & Citus at Large ScaleMicrosoft via YouTube Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube What's New in Grails 2.0
ChariotSolutions via YouTube Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube