| |||||
| |||||
Search Irongeek.com: ![]() ![]()
Help Irongeek.com pay for bandwidth and research equipment: |
Please join us as we present the results of our research into vulnerabilities in Industrial Control System (SCADA) software. Our goal was to identify as many ICS software vulnerabilities as possible within 100 days. The results exceeded our expectations and include among other things: remote code execution, local privilege escalation, and web exploits. Using examples from our findings along with working PoC exploit code and a scanner capable of identifying Industrial Control Systems that we are releasing, we will teach you how to research and find ICS software vulnerabilities yourself.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast