Explore a critical presentation from Black Hat USA 2013 that delves into the vulnerabilities of industrial automation and control systems (IACS) using wireless sensor networks. Learn about the evolution of wireless technologies in industrial settings and their strategic importance across various sectors including energy production, oil, gas, water, utilities, and petrochemical processing. Discover the unique challenges of cryptographic key management in sensor networks and the potential weaknesses in commonly implemented key distribution schemes. Examine real-world attacks that exploit these vulnerabilities, affecting devices from leading industrial wireless automation solution providers. Understand the far-reaching implications of these security flaws, including the ability for untrusted users to read and inject data from up to 40 miles away, and the potential for remotely exploitable memory corruption bugs to shut down entire facilities. Gain insights into the serious consequences of compromised sensors and transmitters on critical decision-making processes in industrial environments.
Overview
Syllabus
Black Hat USA 2013 - Compromising Industrial Facilities From 40 Miles Away
Taught by
Black Hat