Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

Hunting EtherNet/IP Protocol Stacks - Sharon Brizinov | SANS ICS Security Summit 2022

Автор: SANS ICS Security

Загружено: 2022-07-19

Просмотров: 1104

Описание:

Operational technology networks communicate through protocol stacks that are distinct from IT networking protocols. Therefore, we at Team82 (Claroty Research) decided it was important to intimately understand OT protocols in order to uncover vulnerabilities and get them fixed. We want to share one such journey that led to us finding critical vulnerabilities in a few EtherNet/IP protocol stack implementations.

This story starts with research into a well-known PLC firmware, writing a PoC that triggered the bug, and how we helped get it fixed. In this talk we dive deeper into how we hunt for vulnerabilities in different third-party OT protocol libraries, focusing specifically on EtherNet/IP and CIP implementations.

We will explain how these protocols work, what are the common implementation pitfalls, and how we were able to classify different implementations of these protocols and the devices that are using them in order to understand the scope of the vulnerabilities we found. We will also share to the community the tools we developed during our research.

View upcoming Summits: http://www.sans.org/u/DuS

Download the presentation slides (SANS account required) at https://www.sans.org/u/1iaE

Hunting EtherNet/IP Protocol Stacks - Sharon Brizinov | SANS ICS Security Summit 2022

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

PLC Code Security: An Attacker's Perspective - Arnaud Soullie | SANS ICS Security Summit 2022

PLC Code Security: An Attacker's Perspective - Arnaud Soullie | SANS ICS Security Summit 2022

OSDEVCONF25: Современные ускорители ИИ. Владимир Горбацевич

OSDEVCONF25: Современные ускорители ИИ. Владимир Горбацевич

What is Ethernet/IP?

What is Ethernet/IP?

SANS ICS 5 Critical Controls goes to the Board

SANS ICS 5 Critical Controls goes to the Board

3X-UI в 2026 году: Новые протоколы и возможности VLESS Reality/TLS

3X-UI в 2026 году: Новые протоколы и возможности VLESS Reality/TLS

Insurance Data Reveals Correlation Between the SANS Five Critical Controls and Risk Reduction

Insurance Data Reveals Correlation Between the SANS Five Critical Controls and Risk Reduction

STM32 ETHERNET #9 TCP SERVER and CLIENT || NETCONN || FREERTOS || LWIP

STM32 ETHERNET #9 TCP SERVER and CLIENT || NETCONN || FREERTOS || LWIP

Инструменты troubleshooting сети на MikroTik

Инструменты troubleshooting сети на MikroTik

What is an Ethernet PHY?

What is an Ethernet PHY?

Leveraging EtherNet/IP Protocol to Attack OT Infrastructure | Payatu Webinar

Leveraging EtherNet/IP Protocol to Attack OT Infrastructure | Payatu Webinar

Webinar Network Security Zones and Conduits

Webinar Network Security Zones and Conduits

Не используй DNS провайдера! Защищённые DOT, DOH DNS + VPN + Keenetic

Не используй DNS провайдера! Защищённые DOT, DOH DNS + VPN + Keenetic

Цепи Маркова — математика предсказаний [Veritasium]

Цепи Маркова — математика предсказаний [Veritasium]

РОУТЕР С VPN за 1200₽ | OpenWRT + Podkop + Amnezia | Полный Гайд на Xiaomi 4С

РОУТЕР С VPN за 1200₽ | OpenWRT + Podkop + Amnezia | Полный Гайд на Xiaomi 4С

Подробное объяснение моделей OSI и TCP/IP (уровни, протоколы) с подсказками.

Подробное объяснение моделей OSI и TCP/IP (уровни, протоколы) с подсказками.

Kubernetes — Простым Языком на Понятном Примере

Kubernetes — Простым Языком на Понятном Примере

How Embedded TCP/IP Stacks Breed Critical Vulnerabilities

How Embedded TCP/IP Stacks Breed Critical Vulnerabilities

Introduction into IT / OT: Operational Technology (OT) - what is important and what not?

Introduction into IT / OT: Operational Technology (OT) - what is important and what not?

What is EtherCAT?

What is EtherCAT?

Inside a New OT/IoT Cyberweapon: IOCONTROL

Inside a New OT/IoT Cyberweapon: IOCONTROL

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]