SCADAhacker

SCADAhacker Demonstrates Attacking a Stateless Firewall

SCADAhacker Demonstrates Attacking a Stateless Firewall

 

 

April 2012 (14:58)

In this video, Joel Langill, SCADAhacker.com, demonstrates attacking a Stateless Firewall

 

In this video you will find out:

 

Protecting Your ICS from Zero-Day Attacks

Protecting Your ICS from Zero-Day Attacks

Protecting Your ICS from Zero-Day Attacks

Video From: SCADAhacker.com, April 2011

 

Cyber security for industrial control systems is now receiving a lot of attention due in part to the devastating power of the Stuxnet worm and its impact on the Iranian nuclear program in 2010, but also with the disclosure of 34 vulnerabilities on various control systems in March 2011.

 

How Stuxnet Spreads – A Study of Infection Paths in Best Practice Systems

 Byres Security Abterra and SCADAhacker logos

The Stuxnet worm is a sophisticated piece of computer malware designed to sabotage industrial processes controlled by Siemens SIMATIC WinCC and PCS 7 control systems.

This paper describes an example of a site following high security architecture best practices and then shows the ways that the worm could make its way through the defences of the site to take control of the process and cause physical damage.

The paper closes with a discussion of the lessons that can be learned from the analysis of Stuxnet’s propagation pathways. It explains how owners of critical systems need to respond to protect control systems from future threats of this type.

Subscribe to RSS - SCADAhacker