ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

DEF CON 26 - Thiago Alves - Hacking PLCs and Causing Havoc on Critical Infrastructures

Автор: DEFCONConference

Загружено: 2018-10-22

Просмотров: 20836

Описание: Programmable Logic Controllers (PLCs) are devices used on a variety of industrial plants, from small factories to critical infrastructures like nuclear power plants, dams and wastewater systems. Although PLCs were made robust to sustain tough environments, little care was taken to raise defenses against potential cyber threats. As a consequence, threats started pouring in and causing havoc. During this presentation I will talk about the architecture of a PLC and how it can be p0wned. There will be some live demonstration attacks against 3 different brands of PLCs (if the demo demons allow it, if not I will just show a video). Additionally, I will demonstrate two vulnerabilities I recently discovered, affecting the Rockwell MicroLogix 1400 series and the Schneider Modicon M221 controllers.

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
DEF CON 26 - Thiago Alves - Hacking PLCs and Causing Havoc on Critical Infrastructures

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

DEF CON 30  - Sharon Brizinov - Evil PLC Attacks - Weaponizing PLCs

DEF CON 30 - Sharon Brizinov - Evil PLC Attacks - Weaponizing PLCs

DEF CON 32 - Anyone can hack IoT- Beginner’s Guide to Hacking Your First IoT Device - Andrew Bellini

DEF CON 32 - Anyone can hack IoT- Beginner’s Guide to Hacking Your First IoT Device - Andrew Bellini

DEF CON 26 - zerosum0x0 - Demystifying MS17 010 Reverse Engineering the ETERNAL Exploits

DEF CON 26 - zerosum0x0 - Demystifying MS17 010 Reverse Engineering the ETERNAL Exploits

DEF CON 26  - Christopher Domas - The Ring 0 Facade Awakening the Processors Inner Demons

DEF CON 26 - Christopher Domas - The Ring 0 Facade Awakening the Processors Inner Demons

Hacking the Hackers: The Art of Compromising C2 Servers with Vangelis Stykas

Hacking the Hackers: The Art of Compromising C2 Servers with Vangelis Stykas

Cyber Physical Systems Security (5: Attacking SCADA and Modbus Communications)

Cyber Physical Systems Security (5: Attacking SCADA and Modbus Communications)

DEF CON 26  - Christopher Domas - GOD MODE UNLOCKED Hardware Backdoors in redacted x86

DEF CON 26 - Christopher Domas - GOD MODE UNLOCKED Hardware Backdoors in redacted x86

Defcon 21 - All Your RFz Are Belong to Me - Hacking the Wireless World with Software Defined Radio

Defcon 21 - All Your RFz Are Belong to Me - Hacking the Wireless World with Software Defined Radio

An Optical Navigation System Better Than GPS

An Optical Navigation System Better Than GPS

DEF CON 26 - UberKitten, magicspacekiwi - barcOwned Popping Shells with Your Cereal Box

DEF CON 26 - UberKitten, magicspacekiwi - barcOwned Popping Shells with Your Cereal Box

DEF CON 26  - Alexei Bulazel - Reverse Engineering Windows Defenders Emulator

DEF CON 26 - Alexei Bulazel - Reverse Engineering Windows Defenders Emulator

DEF CON 26 - Ossmann and Spill - Revolting Radios

DEF CON 26 - Ossmann and Spill - Revolting Radios

DEF CON 26 - Seamus Burke - A Journey Into Hexagon Dissecting a Qualcomm Baseband

DEF CON 26 - Seamus Burke - A Journey Into Hexagon Dissecting a Qualcomm Baseband

The Memory Sinkhole - Unleashing An X86 Design Flaw Allowing Universal Privilege Escalation

The Memory Sinkhole - Unleashing An X86 Design Flaw Allowing Universal Privilege Escalation

Attacking ICS Devices - Threat Emulation with Conpot

Attacking ICS Devices - Threat Emulation with Conpot

How to hack an industrial control system

How to hack an industrial control system

Код работает в 100 раз медленнее из-за ложного разделения ресурсов.

Код работает в 100 раз медленнее из-за ложного разделения ресурсов.

DEF CON 26 - George Tarnovsky - You Can Run but You Cant Hide Reverse Engineering Using X-Ray

DEF CON 26 - George Tarnovsky - You Can Run but You Cant Hide Reverse Engineering Using X-Ray

How the Best Hackers Learn Their Craft

How the Best Hackers Learn Their Craft

Breaking the IIoT: Hacking industrial Control Gateways

Breaking the IIoT: Hacking industrial Control Gateways

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]