A Diet of Poisoned Fruit - Designing Implants and OT Payloads for ICS Embedded Devices
WEareTROOPERS via YouTube
Overview
This course teaches learners how to design implants and OT payloads for ICS embedded devices. The course covers the Cyber Physical Attack Lifecycle, examples, discovery stage, use cases, attack design, PLC architecture, resource constraints, damage stage, IO manipulation, implant communication, and concludes with a Q&A session. The intended audience for this course is individuals interested in cybersecurity and industrial control systems.
Syllabus
Introduction
Agenda
Cyber Physical Attack Lifecycle
Examples
Discovery Stage
Use Case
Killing a Filter
Backwash
Attack Design
Implants
PLC Architecture
ResourceConstraints
Case Study
Damage Stage
IO Manipulation
Large Suppression
Alarm Relaxation Tightening
Implant Communication
Conclusion
Questions
Taught by
WEareTROOPERS