Hacking Chemical Plants for Competition and Extortion

Hacking Chemical Plants for Competition and Extortion

Hack In The Box Security Conference via YouTube Direct link

Intro

1 of 56

1 of 56

Intro

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Hacking Chemical Plants for Competition and Extortion

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Industrial Control Systems aka SCADA
  3. 3 Cyber-physical systems
  4. 4 Cyber-physical hack
  5. 5 Control equipment vulnerabilities
  6. 6 ICS-CERT recommendation
  7. 7 TCP/IP based communication
  8. 8 Hear is the plant. What is the plan?
  9. 9 Timing of the DoS attack
  10. 10 Impact evaluation
  11. 11 Process control automation
  12. 12 PLC Internals
  13. 13 Control logic
  14. 14 Interlocks
  15. 15 PID control
  16. 16 Time constants
  17. 17 Process control vulnerability
  18. 18 PLC cannot do it alone
  19. 19 Operator is not almighty
  20. 20 Why to attack ICS
  21. 21 Attack payload
  22. 22 What can be done to the process
  23. 23 Attack considerations
  24. 24 Production damage attack
  25. 25 Plants for sale
  26. 26 Hacking Chemical Plant for Competition & Extortion
  27. 27 Stages of SCADA attack
  28. 28 Traditional IT hacking
  29. 29 Modern IT hacking
  30. 30 Know the equipment
  31. 31 Process discovery
  32. 32 Espionage
  33. 33 Max economic damage?
  34. 34 Understanding control structure
  35. 35 Control loop configuration
  36. 36 Understanding points and logic
  37. 37 Physics of process control
  38. 38 Process interdependencies
  39. 39 Understanding process response
  40. 40 Control loop ringing
  41. 41 Process control challenges
  42. 42 Types of attacks
  43. 43 Outcome of the control stage
  44. 44 Alarm propagation
  45. 45 Fingerprints of plant dynamic behavior
  46. 46 How to break things?
  47. 47 Catalyst killers
  48. 48 Hacker unfriendly process
  49. 49 Measuring the process
  50. 50 Technician vs. engineer
  51. 51 Technician answer
  52. 52 Quest for engineering answer
  53. 53 Outcome of the damage stage
  54. 54 Creating forensics footprint
  55. 55 Defeating chemical forensics
  56. 56 Data synchronization and processing

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.