Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Nakatomi Space - Lateral Movement as L1 Post-exploitation in OT

Black Hat via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore deep lateral movement techniques in operational technology (OT) networks through this Black Hat conference talk. Examine various tactics, techniques, and procedures (TTPs) attackers can deploy to navigate through embedded device networks at the lowest levels. Gain insights into the security vulnerabilities of Purdue Reference Model Level 1 (L1) devices such as PLCs and RTUs, which are often treated as security perimeters despite their notorious insecurity. Discover how these devices, positioned at the intersection of multiple mixed networks (Ethernet, Industrial wireless, Fieldbus, etc.), can be exploited for lateral movement. Learn about the implications of treating L1 devices as security boundaries without proper hardening and risk profiling. Presented by Jos Wetzels, this 46-minute talk provides valuable knowledge for cybersecurity professionals and OT network administrators seeking to enhance their understanding of potential attack vectors in industrial control systems.

Syllabus

Nakatomi Space: Lateral Movement as L1 Post-exploitation in OT

Taught by

Black Hat

Reviews

Start your review of Nakatomi Space - Lateral Movement as L1 Post-exploitation in OT

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.