YoVDO

A Diet of Poisoned Fruit - Designing Implants and OT Payloads for ICS Embedded Devices

Offered By: WEareTROOPERS via YouTube

Tags

TROOPERS Courses Cybersecurity Courses Industrial Control Systems Courses

Course Description

Overview

Explore the intricacies of designing implants and operational technology (OT) payloads for industrial control system (ICS) embedded devices in this comprehensive conference talk. Delve into the cyber-physical attack lifecycle, examining real-world examples and use cases. Gain insights into the discovery stage, attack design process, and damage stage techniques. Learn about PLC architecture, resource constraints, and implant communication methods. Understand IO manipulation, large suppression, and alarm relaxation tightening strategies. Conclude with a Q&A session to further expand your knowledge of ICS security vulnerabilities and attack methodologies.

Syllabus

Introduction
Agenda
Cyber Physical Attack Lifecycle
Examples
Discovery Stage
Use Case
Killing a Filter
Backwash
Attack Design
Implants
PLC Architecture
ResourceConstraints
Case Study
Damage Stage
IO Manipulation
Large Suppression
Alarm Relaxation Tightening
Implant Communication
Conclusion
Questions


Taught by

WEareTROOPERS

Related Courses

Modmob Tools - Home Made Tools to Test Mobile Devices and Monitor Networks
WEareTROOPERS via YouTube
Microsoft IT - Secure Journey to IPv6-Only
WEareTROOPERS via YouTube
Introducing Faction - A Modern, Powerful, Multiplayer C2 Framework
WEareTROOPERS via YouTube
Hardware Side Channel Attacks on the Cheapest
WEareTROOPERS via YouTube
Hitting the Gym - The Anatomy of a Killer Workout
WEareTROOPERS via YouTube