Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

What's the DFIRence for ICS?

Black Hat via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the fundamentals of Digital Forensics and Incident Response (DFIR) for Industrial Control Systems (ICS) in this 25-minute Black Hat conference talk. Delve into the world of embedded devices used in critical infrastructure, focusing on Programmable Logic Controllers (PLCs), Remote Terminal Units (RTUs), and controllers. Learn about the files, firmware, memory dumps, physical conditions, and other data that can be analyzed in embedded systems to determine root causes of compromises or misoperations. Examine practical examples of forensic data collection from two popular RTUs used in Electric Substations: the General Electric D20MX and the Schweitzer Engineering Labs SEL-3530 RTAC. Gain insights into VxWorks, ICS anomalies, forensic evidence gathering, and various shells used in control system devices. Discover techniques for analyzing running configurations, using Wireshark, and performing memory analysis. The talk also covers Windows reverse engineering, cool features, and future plans for ICS DFIR, providing a comprehensive overview of this critical field in cybersecurity.

Syllabus

Intro
Agenda
Vxworks
Digital Forensics
How has ICS affected
ICS Anomaly
Forensic Evidence
Control System Devices
Physical Data
Shells
Main Shell
Running Configuration
Wireshark
No Memory
Seashell
Memory
Windows Reverse Engineer
Solution
Cool Features
Demo
Projects
Future Plans
Arktech
Digital Data
Example
Research
Use Case

Taught by

Black Hat

Reviews

Start your review of What's the DFIRence for ICS?

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.