DEF CON 30 - Sharon Brizinov - Evil PLC Attacks - Weaponizing PLCs

แชร์
ฝัง
  • เผยแพร่เมื่อ 12 ต.ค. 2024
  • These days, Programmable Logic Controllers (PLC) in an industrial network are a critical attack target, with more exploits being identified every day. But what if the PLC wasn’t the prey, but the predator? This presentation demonstrates a novel TTP called the "Evil PLC Attack", where a PLC is weaponized in a way that when an engineer is trying to configure or troubleshoot it, the engineer’s machine gets compromised.
    We will describe how engineers diagnose PLC issues, write code, and transfer bytecode to PLCs for execution with industrial processes in any number of critical sectors, including electric, water and wastewater, heavy industry, and automotive manufacturing. Then we will describe how we conceptualized, developed, and implemented different techniques to weaponize a PLC in order to achieve code execution on an engineer’s machine.
    The research resulted in working PoCs against ICS market leaders which fixed all the reported vulnerabilities and remediated the attack vector. Such vendors include Rockwell Automation, Schneider Electric, GE, B&R, Xinje, OVARRO and more.
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 29

  • @willemvdk4886
    @willemvdk4886 ปีที่แล้ว +13

    Much, much respect. There is a LOT of work in that 10 seconds he spent on telling us about the protocol reversing. Incredible.

  • @arbibenmaatoug5566
    @arbibenmaatoug5566 20 วันที่ผ่านมา

    very impressive , big applause , respect , can't find words to congratulate you bro. nice feeling after all . our adrenaline ,our joy.

  • @halo37253
    @halo37253 ปีที่แล้ว +24

    Sad to see the two biggest PLC Vendors main product lines missing.
    Rockwell with Studio5000 and Control Logix or Compact Logix
    Siemens with TIA Portal and S7 1200 or 1500.
    They have a Cheap modern Micrologix with CCW, which no one uses. I think the only thing CCW is used for by most engineers is to configure Power Flex Drives if not using drive tools.

    • @CrIMeFiBeR
      @CrIMeFiBeR ปีที่แล้ว +1

      Really intrested in siemens exploitation

    • @ivanv754
      @ivanv754 ปีที่แล้ว

      Well those are very very expensive and you kind of need a service contract to fully use

  • @peterevenhuis2663
    @peterevenhuis2663 ปีที่แล้ว +21

    Good that you totally missed Siemens, now I can sleep better

    • @chebhou
      @chebhou ปีที่แล้ว +2

      I was looking for it too 🤣

    • @Mekkor
      @Mekkor ปีที่แล้ว +1

      They technically missed Allen-Bradley as well as they only covered Micro800s with Connected Components Workbench, which is free licensing.

  • @johnmhedges
    @johnmhedges ปีที่แล้ว +3

    Most IDEs don't load the source code to the PLC unless the programmer downloads it or enables the feature in the programming environment.

  • @SALTINBANK
    @SALTINBANK ปีที่แล้ว +2

    Great talk from unit 8200 !)

  • @tommyhuffman7499
    @tommyhuffman7499 ปีที่แล้ว

    A more advanced explanation of how PLC's work. Love it!!

  • @Jeeperanthony
    @Jeeperanthony ปีที่แล้ว

    Really cool! I assume you could put a flag in that would allow authorized personnel (through MAC, IP, etc) to upload.

  • @NickMoore
    @NickMoore ปีที่แล้ว

    That was awesome!

  • @ChristoffelTensors
    @ChristoffelTensors ปีที่แล้ว

    Bro is the RTFM gigaCHAD

  • @lassorb4752
    @lassorb4752 ปีที่แล้ว

    What about Siemens?

  • @MrGillb
    @MrGillb ปีที่แล้ว

    I wonder how many people bricked PLCs due to the confusing ass nomenclature

  • @johnkost2514
    @johnkost2514 ปีที่แล้ว +3

    Just a replay of Stuxnet, and from well, I'll just leave it at that..

    • @DeShark88
      @DeShark88 ปีที่แล้ว +3

      It's err.. nothing like Stuxnet. What are you on about? It involves PLCs, sure, but the method and outcome is totally different.

    • @johnkost2514
      @johnkost2514 ปีที่แล้ว

      @@DeShark88 it's an insertion attack. Stuxnet modified the Step7/WinCC DLL(s). The payloads and focus was on DLL(s).

    • @DeShark88
      @DeShark88 ปีที่แล้ว +4

      @@johnkost2514 the attack vector was totally different. One was an OS 0-day (Windows Shortcuts) exploited via USB stick, and the other is via a honeypot. Also the target was different. In Stuxnet the target was the PLCs, in this attack the target is those trying to hack PLCs. Sure, the PLC programmer's DLLs were edited in both cases, but I wouldn't call this a simple replay, since it's being done the opposite way around to target the complete opposite target.

    • @johnkost2514
      @johnkost2514 ปีที่แล้ว +2

      @@DeShark88 there were multiple Stuxnet campaigns (versions) and the probability that all were delivered via a USB is suspect. Again, DLL(s) were the focus of the exploit. Anyone who really knows the deeper constructs of ICS security and vulnerability would acknowledge the similarities. Relax your ego. I made an observation, I stated the similarity. Cyber researchers generally have more open minds than you do.

  • @cesar.automacao
    @cesar.automacao ปีที่แล้ว

    Wow :p

  • @TheEndermanOfEvil
    @TheEndermanOfEvil ปีที่แล้ว

    fuck yeah, thats dope as

  • @bahadirm
    @bahadirm ปีที่แล้ว +5

    Dude, people hacking an exposed PLC found on Shodan with possibly propriety IDE/Developement Software that they had most likely need to pay for, are not script kiddies.

    • @mlu5653
      @mlu5653 ปีที่แล้ว +5

      You think they paid for it?...xD

    • @bahadirm
      @bahadirm ปีที่แล้ว +1

      @@mlu5653 depends on the IDE and their implementation of software/dongle licensing.

    • @prometheuscubesystems4399
      @prometheuscubesystems4399 ปีที่แล้ว +1

      yeah he think them r paying kkk

  • @jeremydaniels1973
    @jeremydaniels1973 ปีที่แล้ว +1

    I was excited when I read the title but let down by the execution of this presentation..

    • @DeShark88
      @DeShark88 ปีที่แล้ว +5

      What were you let down by? The content of the presentation was excellent in my opinion.