Process Control Through Counterfeit Comms - Using and Abusing Built-In Functionality to Own a PLC
Offered By: 0xdade via YouTube
Course Description
Overview
Syllabus
Intro
INTRODUCTION
PROJECT ORIGIN
PROJECT GOALS
PLC - MICROLOGIX 1400
PLC - KEYSWITCH STATES
PLC - COMMUNICATION PROTOCOLS
PLC - PCCC STRUCTURE
PLC - PROTOCOL RESOURCES
PLC - DEVICE CONFIGURATION
ENABLING SNMP - REASONS & REQUIREMENTS
ENABLING SNMP - RSLOGIX
ENABLING SNMP - GET CURRENT CONFIG
ENABLING SNMP – PROTOCOL BITFIELD
ENABLING SNMP – CRC ERRORS
ENABLING SNMP – REBUILD CONFIG
ENABLING SNMP – WRITE CONFIG
ENABLING SNMP - SUCCESS INDICATOR
REBOOTING THE PLC - REASONS & REQUIREMENTS
REBOOTING THE PLC - BASIC FUZZING
REBOOTING THE PLC - E8FF CRASH
REBOOTING THE PLC - CRASH RECOVERY
MEMORY MODULE - REASONS & REQUIREMENTS
MEMORY MODULE - LOAD ON ERROR PCCC Protected Typed Logical Write with Three Address Fields
MEMORY MODULE - WRITE NEW CONFIG
MEMORY MODULE - CONFIG VERIFICATION
MEMORY MODULE - STORE PROGRAM
ATTACK SO FAR
MODIFIED FIRMWARE - CREATION
FLASHING FIRMWARE - SNMP BACKDOOR
FLASHING FIRMWARE - SNMP REBOOT
FLASHING FIRMWARE - TFTP
FLASHING FIRMWARE - UPDATE PROCESS
FLASHING FIRMWARE - SUCCESS
IMPACT
MITIGATION - RECOMMENDATIONS
MITIGATION - SPECIAL RECOMMENDATIONS
ADDITIONAL RESOURCES
Taught by
0xdade
Related Courses
Security Principles(ISC)² via Coursera A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera FinTech for Finance and Business Leaders
ACCA via edX Access Control Concepts
(ISC)² via Coursera Access Controls
(ISC)² via Coursera