Read Time:39 Second
This video shows a “MITM” scenario performed between PLC and an HMI. This attack vector shows how to get full control of a motor (the endpoint device). after poisoning the arp table of the HMI and inserting fake values , they sent desirable values to the PLC directly in order to produce a false representation (similar to the results of the Stuxnet attack).
این ویدئو سناریوی “MITM” را نشان می دهد که بین PLC و HMI انجام شده است. این بردار حمله نحوه کنترل کامل موتور (دستگاه نقطه انتهایی) را نشان می دهد. پس از مسموم كردن جدول arp از HMI و درج مقادیر جعلی ، آنها م
قادیر مطلوبی را مستقیماً به PLC ارسال كردند تا نمایش غلطی ایجاد كنند (شبیه به نتایج حمله Stuxnet#
#iot
#ics
#plc

About Post Author
Treadstone 71
@Treadstone71LLC
Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
You must be logged in to post a comment.