A Diet of Poisoned Fruit - Designing Implants and OT Payloads for ICS Embedded Devices
Offered By: WEareTROOPERS via YouTube
Course Description
Overview
Explore the intricacies of designing implants and operational technology (OT) payloads for industrial control system (ICS) embedded devices in this comprehensive conference talk. Delve into the cyber-physical attack lifecycle, examining real-world examples and use cases. Gain insights into the discovery stage, attack design process, and damage stage techniques. Learn about PLC architecture, resource constraints, and implant communication methods. Understand IO manipulation, large suppression, and alarm relaxation tightening strategies. Conclude with a Q&A session to further expand your knowledge of ICS security vulnerabilities and attack methodologies.
Syllabus
Introduction
Agenda
Cyber Physical Attack Lifecycle
Examples
Discovery Stage
Use Case
Killing a Filter
Backwash
Attack Design
Implants
PLC Architecture
ResourceConstraints
Case Study
Damage Stage
IO Manipulation
Large Suppression
Alarm Relaxation Tightening
Implant Communication
Conclusion
Questions
Taught by
WEareTROOPERS
Related Courses
Modmob Tools - Home Made Tools to Test Mobile Devices and Monitor NetworksWEareTROOPERS via YouTube Microsoft IT - Secure Journey to IPv6-Only
WEareTROOPERS via YouTube Introducing Faction - A Modern, Powerful, Multiplayer C2 Framework
WEareTROOPERS via YouTube Hardware Side Channel Attacks on the Cheapest
WEareTROOPERS via YouTube Hitting the Gym - The Anatomy of a Killer Workout
WEareTROOPERS via YouTube