Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Debug7 - Leveraging a Firmware Modification Attack for Remote Debugging of Siemens S7 PLCs

Black Hat via YouTube

Overview

Explore a groundbreaking method for debugging Siemens S7 PLC firmware in this 37-minute Black Hat conference talk. Delve into the researchers' discovery of a vulnerability in Siemens' software PLC, ET 200SP, which allows for runtime modification and remote debugging of the S7-1500 firmware. Learn how the team exploited a forgotten debug flag to replace the encrypted SWCPU with an arbitrary ELF file, enabling remote control through an existing HTTP session. Discover the novel debugger developed by the researchers, capable of setting breakpoints, reading/writing memory, and persisting installation due to lack of secure boot. Understand the significant implications of this research for future studies on Siemens S7 PLCs and the potential security risks for remote attackers controlling the Windows VM. Gain insights from experts at the Technion, Israel Institute of Technology, as they present their findings on this critical vulnerability in industrial control systems.

Syllabus

Debug7: Leveraging a Firmware Modification Attack for Remote Debugging of Siemens S7 PLCs

Taught by

Black Hat

Reviews

Start your review of Debug7 - Leveraging a Firmware Modification Attack for Remote Debugging of Siemens S7 PLCs

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.