Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Tape Loops for Industrial Control Protocols

via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore industrial control protocol vulnerabilities and attack techniques in this 50-minute conference talk from Circle City Con 2014. Delve into the intricacies of HMI systems, L2 and L3 networks, firewalls, and PLCs, with a focus on their inherent security flaws. Learn about Modbus functionality, application firewalls, and sniffing techniques. Discover the concept of "tape loops" for manipulating industrial protocols, and understand their potential impact on various systems. Examine the motivations behind exploiting these vulnerabilities and consider the broader implications for industrial cybersecurity.

Syllabus

Intro
The Outline
HMI
Other L2 Systems
What Lives on L3?
Firewalls
PLCs == Insecure By Design
Modicon Quantum
ControlLogix
Why Level 2?
Tofino Hardware
Types of Operation
How Modbus Works
The Problem in a Nutshell
Modbus Function Codes
Application Firewall
Ettercap
Sniff and Record
Timer Expiration
Overwrite: Engage
Modbus VCR: What you've got
Tape Loops
Modbus VCR: Sound Familiar?
Other protocols
The Gauntlet
Why Profit?
Okay, Profit!
Conclusion

Reviews

Start your review of Tape Loops for Industrial Control Protocols

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.