The Sum of All Fears - When ICS - SCADA Are Compromised

The Sum of All Fears - When ICS - SCADA Are Compromised

Hack In The Box Security Conference via YouTube Direct link

ICS Attack Vectors(1/2)

15 of 22

15 of 22

ICS Attack Vectors(1/2)

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

The Sum of All Fears - When ICS - SCADA Are Compromised

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Outline
  3. 3 What is Industrial Control System, ICS?
  4. 4 Purdue Enterprise Reference Architecture, PERA
  5. 5 Common ICS Architecture
  6. 6 ICS Operation
  7. 7 Programmable Logic Controller, PLC
  8. 8 Human Machine Interface. HMI
  9. 9 2015 Ukraine Power Grid Cyber Attack
  10. 10 2017 Triton/Trisis Malware Attack
  11. 11 2018 Taiwan Semiconductor Factory Malware Attack
  12. 12 The ICS Vulnerabilities from NVD
  13. 13 Threat Hunting with PLC Honeypot
  14. 14 ICS Protocols in Shodan
  15. 15 ICS Attack Vectors(1/2)
  16. 16 Communication Protocol Attack
  17. 17 Hacking Path
  18. 18 Remote Stop PLC with M Protocol
  19. 19 Command Injection
  20. 20 Common Flaws in ICS Protocols
  21. 21 Exploit FTP Service-Upload malicious plc program file to
  22. 22 Fortification for OT Cyber Defense: Defense in Depth

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.