Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

DTM Components - Shadow Keys to the ICS Kingdom

Black Hat via YouTube

Overview

Explore the security vulnerabilities in Device Type Manager (DTM) components used in industrial control systems during this Black Hat conference talk. Dive into the complex architectures of ICS networks, focusing on FDT/DTM standardization for communication and configuration of field devices. Analyze components for hundreds of devices based on Modbus, HART, and Profibus DP protocols, uncovering insufficient data filtration, XSS, XXE, SSRF, DoS, and other security flaws. Gain insights into the research scope, vulnerability distribution, and statistics across various vendors. Learn about memory corruptions, remote code execution risks, and the implications of developers ignoring standards. Understand the critical importance of securing these components used in oil, gas, energy, nuclear, chemical, and other vital industries.

Syllabus

Introduction
Who am I
Agenda
Theory ICS
Field Protocols
Field Devices
OPC
Key Detail Component Concepts
Simplified Scheme of Working
Screenshot
Internal Architecture
Sources
Research Scope
Hard Transmitter
Wired Transmitter
Hardware Tools
DTM Components
Lab
Oscilloscope
ICS Cursor
Atticus
DTM Vendors
Final Results
Vulnerability Distribution
Memory Corruptions
Other Flaws
XSS Scripting
Ignoring Standards
Developers are too lazy
Software quality
Remote code execution
Statistics
MDT Version 2
MDT Security
Conclusions
Links
Research

Taught by

Black Hat

Reviews

Start your review of DTM Components - Shadow Keys to the ICS Kingdom

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.