Completed
Hear is the plant. What is the plan?
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Hacking Chemical Plants for Competition and Extortion
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Industrial Control Systems aka SCADA
- 3 Cyber-physical systems
- 4 Cyber-physical hack
- 5 Control equipment vulnerabilities
- 6 ICS-CERT recommendation
- 7 TCP/IP based communication
- 8 Hear is the plant. What is the plan?
- 9 Timing of the DoS attack
- 10 Impact evaluation
- 11 Process control automation
- 12 PLC Internals
- 13 Control logic
- 14 Interlocks
- 15 PID control
- 16 Time constants
- 17 Process control vulnerability
- 18 PLC cannot do it alone
- 19 Operator is not almighty
- 20 Why to attack ICS
- 21 Attack payload
- 22 What can be done to the process
- 23 Attack considerations
- 24 Production damage attack
- 25 Plants for sale
- 26 Hacking Chemical Plant for Competition & Extortion
- 27 Stages of SCADA attack
- 28 Traditional IT hacking
- 29 Modern IT hacking
- 30 Know the equipment
- 31 Process discovery
- 32 Espionage
- 33 Max economic damage?
- 34 Understanding control structure
- 35 Control loop configuration
- 36 Understanding points and logic
- 37 Physics of process control
- 38 Process interdependencies
- 39 Understanding process response
- 40 Control loop ringing
- 41 Process control challenges
- 42 Types of attacks
- 43 Outcome of the control stage
- 44 Alarm propagation
- 45 Fingerprints of plant dynamic behavior
- 46 How to break things?
- 47 Catalyst killers
- 48 Hacker unfriendly process
- 49 Measuring the process
- 50 Technician vs. engineer
- 51 Technician answer
- 52 Quest for engineering answer
- 53 Outcome of the damage stage
- 54 Creating forensics footprint
- 55 Defeating chemical forensics
- 56 Data synchronization and processing