What's the DFIRence for ICS?
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the fundamentals of Digital Forensics and Incident Response (DFIR) for Industrial Control Systems (ICS) in this 25-minute Black Hat conference talk. Delve into the world of embedded devices used in critical infrastructure, focusing on Programmable Logic Controllers (PLCs), Remote Terminal Units (RTUs), and controllers. Learn about the files, firmware, memory dumps, physical conditions, and other data that can be analyzed in embedded systems to determine root causes of compromises or misoperations. Examine practical examples of forensic data collection from two popular RTUs used in Electric Substations: the General Electric D20MX and the Schweitzer Engineering Labs SEL-3530 RTAC. Gain insights into VxWorks, ICS anomalies, forensic evidence gathering, and various shells used in control system devices. Discover techniques for analyzing running configurations, using Wireshark, and performing memory analysis. The talk also covers Windows reverse engineering, cool features, and future plans for ICS DFIR, providing a comprehensive overview of this critical field in cybersecurity.
Syllabus
Intro
Agenda
Vxworks
Digital Forensics
How has ICS affected
ICS Anomaly
Forensic Evidence
Control System Devices
Physical Data
Shells
Main Shell
Running Configuration
Wireshark
No Memory
Seashell
Memory
Windows Reverse Engineer
Solution
Cool Features
Demo
Projects
Future Plans
Arktech
Digital Data
Example
Research
Use Case
Taught by
Black Hat
Related Courses
Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security ChipBlack Hat via YouTube Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube