Hacking Mitsubishi PLC Without Access To Firmware
Offered By: nullcon via YouTube
Course Description
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of hacking Mitsubishi PLCs without firmware access in this illuminating conference talk by Anton Dorfman at Nullcon Goa 2023. Delve into the challenges of reverse engineering proprietary network protocols, from initial research to vulnerability discovery. Learn about innovative techniques used to reconstruct the protocol, including documentation analysis, error code examination, vendor utility exploration, and PLC simulation. Gain insights into the discovered vulnerabilities, with a focus on CVE-2022-25161 and CVE-2022-25162. Witness a live demonstration showcasing the potential impact of these vulnerabilities on industrial systems. Perfect for security researchers and professionals interested in industrial control system security and firmware analysis.
Syllabus
Speaker and Talk Introduction
Pre-Research
Welcome To Hell The World Of Bytes And Bits
Reverse Engineering Eye-Gineering
M Protocol
M Protocol vs PCAP
PCAP vs Manual
M Protocol vs Manual
Preliminary results
Research
Results
Vulnerabilities
Do's & Demo
Conclusion
Taught by
nullcon
Related Courses
Applied ChatGPT for CybersecurityInfosec via Coursera Become an Influencer at Work
CreativeLive Fundamentos de Ciberseguridad: un enfoque práctico
Inter-American Development Bank via edX Advanced Malware Analysis: Redux
Cybrary How to Use GDB (BSWJ)
Cybrary