0 0
Read Time:39 Second

This video shows a “MITM” scenario performed between PLC and an HMI. This attack vector shows how to get full control of a motor (the endpoint device). after poisoning the arp table of the HMI and inserting fake values , they sent desirable values to the PLC directly in order to produce a false representation (similar to the results of the Stuxnet attack).

این ویدئو سناریوی “MITM” را نشان می دهد که بین PLC و HMI انجام شده است. این بردار حمله نحوه کنترل کامل موتور (دستگاه نقطه انتهایی) را نشان می دهد. پس از مسموم كردن جدول arp از HMI و درج مقادیر جعلی ، آنها م

قادیر مطلوبی را مستقیماً به PLC ارسال كردند تا نمایش غلطی ایجاد كنند (شبیه به نتایج حمله Stuxnet#
#iot
#ics
#plc

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

By Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence