انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !
Alon Dankner on Extracting Crypto Keys from PLCs
Manage episode 435050047 series 3308427
Alon Dankner of the Technion Institute for Technology in TelAviv Israel joins the Claroty Nexus Podcast to discuss a presentation he gave at the recent Black Hat cybersecurity conference in Las Vegas. Dankner and colleague Nadav Adir's presentation looked at the attack surface of programmable logic controllers (PLCs), in particular Siemens’ S7 protocol. Dankner and Adir developed six attacks against the encryption implementation in the protocol that expose private crypto keys and allow an attacker full control over the industrial control system.
For more, visit nexusconnect.io/podcasts
93 حلقات
Manage episode 435050047 series 3308427
Alon Dankner of the Technion Institute for Technology in TelAviv Israel joins the Claroty Nexus Podcast to discuss a presentation he gave at the recent Black Hat cybersecurity conference in Las Vegas. Dankner and colleague Nadav Adir's presentation looked at the attack surface of programmable logic controllers (PLCs), in particular Siemens’ S7 protocol. Dankner and Adir developed six attacks against the encryption implementation in the protocol that expose private crypto keys and allow an attacker full control over the industrial control system.
For more, visit nexusconnect.io/podcasts
93 حلقات
كل الحلقات
×
1 Florence Hudson on the IEEE/UL 2933 Clinical IOT Cybersecurity Standard 40:39

1 Mike Holcomb on Starting and Succeeding in OT Cybersecurity 42:40

1 Ron Fabela on Low-Skilled OT and ICS Threat Actors 36:33

1 Munish Walther-Puri on Creating a Scale for Cybersecurity Incidents 33:25

1 Brian Foster on the Risks of a Hyperconnected Grid 27:17

1 CISA's Matthew Rogers on Secure by Demand for OT 39:23


1 Team82 on Attacking the Insecure IoT Cloud 31:38

1 Volexity's Steven Adair on the Nearest Neighbor Attack 37:23

1 Joe Saunders on Advanced Cyberattacks Against Critical Infrastructure 34:43

1 Grant Geyer on the Business Impact of Disruptions from Cyberattacks 25:03

1 Alethe Denis on Social Engineering, Red-Teaming 43:45

1 Alon Dankner on Extracting Crypto Keys from PLCs 27:58

1 Noam Moshe on Extracting Forensic Data from Unitronics PLCs 27:52

1 Alexander Antukh on Cyber Risk Quantification 43:05
مرحبًا بك في مشغل أف ام!
يقوم برنامج مشغل أف أم بمسح الويب للحصول على بودكاست عالية الجودة لتستمتع بها الآن. إنه أفضل تطبيق بودكاست ويعمل على أجهزة اندرويد والأيفون والويب. قم بالتسجيل لمزامنة الاشتراكات عبر الأجهزة.