YoVDO

Nakatomi Space - Lateral Movement as L1 Post-exploitation in OT

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Network Engineering Courses Lateral Movement Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore deep lateral movement techniques in operational technology (OT) networks through this Black Hat conference talk. Examine various tactics, techniques, and procedures (TTPs) attackers can deploy to navigate through embedded device networks at the lowest levels. Gain insights into the security vulnerabilities of Purdue Reference Model Level 1 (L1) devices such as PLCs and RTUs, which are often treated as security perimeters despite their notorious insecurity. Discover how these devices, positioned at the intersection of multiple mixed networks (Ethernet, Industrial wireless, Fieldbus, etc.), can be exploited for lateral movement. Learn about the implications of treating L1 devices as security boundaries without proper hardening and risk profiling. Presented by Jos Wetzels, this 46-minute talk provides valuable knowledge for cybersecurity professionals and OT network administrators seeking to enhance their understanding of potential attack vectors in industrial control systems.

Syllabus

Nakatomi Space: Lateral Movement as L1 Post-exploitation in OT


Taught by

Black Hat

Related Courses

Enterprise Security Fundamentals
Microsoft via edX
Red Team Ethical Hacking - Beginner
Udemy
Active Directory Pentesting With Kali Linux - Red Team
Udemy
Lateral Movement with CrackMapExec
Pluralsight
Lateral Movement with Infection Monkey
Pluralsight