Increasing demands in the industrial sector, such as predictive maintenance and remote servicing, also increase the amount of network capable industrial components. Furthermore, these cross-connections from the OT to the IT network increase the attack surface, enabling access to industrial devices for hackers.
This talk will demonstrate how hackers can easily interact with the physical side of PLCs. This means that attackers can cause effects in the real world over the Ethernet communication of the PLC. Then vulnerable devices around the world will be shown along with how they could be impacted by DoS attacks. This session will provide answers to questions on how vulnerabilities of this kind could be searched, how to interact within disclosure processes, and recommendations for manufacturers, operators and penetration testers will be given.
Learning Objectives:- Insights into the interaction between the network and real-world physical process of ICS components.
- How to find and map vulnerabilities to ICS components.
- How to treat vulnerabilities as a manufacturer, integrator and operator?
- How to securely scan and monitor industrial network from the viewing angle of device robustness?