YoVDO

Nakatomi Space - Lateral Movement as L1 Post-exploitation in OT

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Network Engineering Courses Lateral Movement Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore deep lateral movement techniques in operational technology (OT) networks through this Black Hat conference talk. Examine various tactics, techniques, and procedures (TTPs) attackers can deploy to navigate through embedded device networks at the lowest levels. Gain insights into the security vulnerabilities of Purdue Reference Model Level 1 (L1) devices such as PLCs and RTUs, which are often treated as security perimeters despite their notorious insecurity. Discover how these devices, positioned at the intersection of multiple mixed networks (Ethernet, Industrial wireless, Fieldbus, etc.), can be exploited for lateral movement. Learn about the implications of treating L1 devices as security boundaries without proper hardening and risk profiling. Presented by Jos Wetzels, this 46-minute talk provides valuable knowledge for cybersecurity professionals and OT network administrators seeking to enhance their understanding of potential attack vectors in industrial control systems.

Syllabus

Nakatomi Space: Lateral Movement as L1 Post-exploitation in OT


Taught by

Black Hat

Related Courses

4G Network Essentials
Institut Mines-Télécom via edX
Data Plane Programming
Karlstad University via Independent
Preparing for Google Cloud Certification: Cloud Network Engineer
Google Cloud via Coursera
CCNP Route 642-902 Implementing Cisco IP Routing
Udemy
Linux for Network Engineers: Practical Linux with GNS3
Udemy