Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

From Pass-the-Hash to Code Execution on Schneider Electric M340 PLCs

Black Hat via YouTube

Overview

Coursera Plus Monthly Sale: All Certificates & Courses 40% Off!
This conference talk explores vulnerabilities in Schneider Electric's Modicon PLCs within industrial control systems. Discover how researchers Amir Zaltzman and Avishai Wool reverse-engineered the cryptographic protocol to identify critical security flaws that allow attackers to impersonate engineering stations, cryptographically sign messages, and inject malicious communications. Learn about additional vulnerabilities in the PLC's memory management that enable remote code execution, installation of persistent rootkits, and even potential reprogramming of boot firmware over the network. Understand the security implications for industrial systems where these PLCs serve as intermediaries between engineering stations/SCADA HMI and the physical industrial control mechanisms.

Syllabus

From Pass-the-Hash to Code Execution on Schneider Electric M340 PLCs

Taught by

Black Hat

Reviews

Start your review of From Pass-the-Hash to Code Execution on Schneider Electric M340 PLCs

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.