A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Search Irongeek.com:

Affiliates:
ISDPodcast Button
RootSecure Button
Social-engineer-training Button
Irongeek Button

Web Hosting:
Dreamhost Logo
Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Tape Loops for Industrial Control Protocols — K. Reid Wightman (Circle City Con 2014 Videos) (Hacking Illustrated Series InfoSec Tutorial Videos)

Tape Loops for Industrial Control Protocols — K. Reid Wightman
Circle City Con 2014
http://circlecitycon.com

Abstract: In the last twenty years, industrial control systems have transitioned from esoteric serial networks to slightly less esoteric Ethernet and IP-based networks. Unfortunately the increased connectivity has not included an increase in the basic security posture of industrial protocols.

In the 2010s we are now seeing nearly weekly demonstrations of the lack of security in the protocols that runs our power grid, water supplies, and gas pipelines.

In this talk we demonstrate a new class of attack. While many hackers are keen to demonstrate malicious control of control systems networks, we instead opt to show how easy it is to hide the effects of malicious control from the operators.

Back to Circle City Con 2014 Videos list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2014, IronGeek
Louisville / Kentuckiana Information Security Enthusiast