DEF CON 31 - Exploiting OPC UA - Practical Attacks Against OPC UA Architectures - Moshe, Brizinov

  Рет қаралды 1,685

DEFCONConference

DEFCONConference

8 ай бұрын

OPC-UA is the most popular protocol today in ICS/SCADA and IoT environments for data exchanges from sensors to on-premises or cloud applications. OPC-UA is therefore the bridge between different OT trust zones and a crown jewel for attacks attempting to break security zones and crossover from the industrial to corporate networks.
We have been researching during the past two years dozens of OPC-UA protocol stack implementations being used in millions of industrial products. We focused on two main attack vectors: attacking OPC-UA servers and protocol gateways, and attacking OPC-UA clients. The research yielded unique attack techniques that targeted specific OPC-UA protocol specification pitfalls that enabled us to create a wide range of vulns ranging from denial of service to remote code execution.
For example, we explored OPC-UA features such as method call processing, chunking mechanisms, certification handling, complex variant structures, monitored items, race-conditions, and many more. For each part of the specification, we tried to understand its caveats and exploit them to achieve RCE, information leaks, or denial of service attacks.
In this talk, we will share our journey, methods, and release an open-source framework with all of our techniques and vulnerabilities to exploit modern OPC-UA protocol stacks. , Noam Moshe is a vulnerability researcher at Claroty Team82. Noam specializes in vulnerability research, web applications pentesting, malware analysis, network forensics and ICS/SCADA security. In addition, Noam presented in well-known Hacking conferences like Blackhat Europe, as well as won Master of Pwn at Pwn2Own Miami 2023.

Пікірлер: 1
@ANlevant
@ANlevant 3 ай бұрын
very useful, thanks for doing this!
What is OPC? UA in a Minute
1:37
TheOPCFoundation
Рет қаралды 450 М.
Miracle Doctor Saves Blind Girl ❤️
00:59
Alan Chikin Chow
Рет қаралды 52 МЛН
Китайка и Пчелка 4 серия😂😆
00:19
KITAYKA
Рет қаралды 894 М.
КАХА и Джин 2
00:36
К-Media
Рет қаралды 4,1 МЛН
What I LOVE and HATE About MQTT and OPC UA
13:58
RealTimeAutomation
Рет қаралды 22 М.
COPPER PIPE MADE INTO A STUDIO DELAY THAT RUNS AT THE SPEED OF SOUND
11:50
LOOK MUM NO COMPUTER
Рет қаралды 127 М.
What is Modbus and How does it Work?
8:58
RealPars
Рет қаралды 1,6 МЛН
SCADA Hacking | Operational Technology (OT) Attacks
7:09
Hackrypt
Рет қаралды 26 М.
What is a Server?  Servers vs Desktops Explained
7:14
PowerCert Animated Videos
Рет қаралды 2,7 МЛН
Basic Networking Commands (Part 1)
14:11
Neso Academy
Рет қаралды 1,6 МЛН
pfSense Firewall - pfSense Administration Full Course
3:35:47
Knowledge Power
Рет қаралды 463 М.
iphone fold ? #spongebob #spongebobsquarepants
0:15
Si pamer 😏
Рет қаралды 424 М.
Will the battery emit smoke if it rotates rapidly?
0:11
Meaningful Cartoons 183
Рет қаралды 1,9 МЛН
ПРОБЛЕМА МЕХАНИЧЕСКИХ КЛАВИАТУР!🤬
0:59
Корнеич
Рет қаралды 3,5 МЛН