Exfiltrating Reconnaissance Data from Air-Gapped ICS - SCADA Networks

Exfiltrating Reconnaissance Data from Air-Gapped ICS - SCADA Networks

Black Hat via YouTube Direct link

Attack vectors

4 of 27

4 of 27

Attack vectors

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Exfiltrating Reconnaissance Data from Air-Gapped ICS - SCADA Networks

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 What are OT networks
  3. 3 Getting to OT networks
  4. 4 Attack vectors
  5. 5 Introduction to PLCs
  6. 6 PLC Blocks
  7. 7 Leather Logic
  8. 8 Frequency
  9. 9 Letter Logic
  10. 10 Receiving
  11. 11 Receiving Data
  12. 12 Detection
  13. 13 Questions
  14. 14 Power surges
  15. 15 PLC modes
  16. 16 CPU utilization
  17. 17 PLC CPU utilization
  18. 18 PLC noise
  19. 19 disturbances on other instructions
  20. 20 testing other instructions
  21. 21 whats producing the AM directing
  22. 22 reading data from 1m
  23. 23 better antenna
  24. 24 better result
  25. 25 outdated software
  26. 26 passive monitoring
  27. 27 reverse engineering

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.