S7 serisi CPU'lara zarar verebilecek olası durumlar - My files - DOSYA PAYLASIMI - AHMET BOGUS ELECO TEST DRIVE
Tuesday
06.December.2016
12:10
Login form
Section categories
My files [54]
mytools [4]
Search ARAMA
Oy Havuzu
BU SEZON KIM SAMPIYON OLUR KI?
Total of answers: 109
Dost Siteler
  • Kendine Bir site Hazırla
  • Statistics

    Total online: 1
    Guests: 1
    Users: 0

    TEST ELECO

    DOSYA PAYLASIMI

    Main » Files » My files

    S7 serisi CPU'lara zarar verebilecek olası durumlar
    [ Download from this server (4.63Mb) ] 12.September.2011, 22:37
    ABSTRACT
    This white paper is a roadmap for new and emerging threats against industrial
    control systems (ICS) and the protocols on which field devices rely to
    communicate with control systems across a network. Protocols such as
    International Standards Organization Transport Service Access Point (ISO-TSAP
    RFC 1006) and others were designed, in the past, without any security in mind.
    These protocols were intended to be open and reliable, not secure. In fact, most
    Programmable Logic Controllers (PLCs) were also built on the assumption that
    security was unnecessary as long as the device was deployed inside an “air gap”
    network. However, recent events, such as the widespread dissemination of
    Stuxnet, have demonstrated that this is not a safe assumption on which to base
    critical design implementation decisions. We must consider where these devices
    are deployed; PLCs are used in power plants (including nuclear), pipelines, oil
    and gas refineries, hydroelectric dams, water and waste, and weapon systems.
    We cannot simply rest idle and wait for something to fail or, worse, explode. We
    must act now, and we must be diligent in mitigating these issues. ICS vendors
    together with the help of ICS-CERT should work with independent security
    researchers to promote responsible disclosure. In this paper we will discuss,
    reconnaissance, fingerprinting, replay attacks, authentication bypass methods,
    and remote exploitation, and how these techniques can be used to attack a
    Siemens Simatic S7 PLC.
    Category: My files | Added by: ahmetbogus
    Views: 716 | Downloads: 183 | Comments: 3 | Rating: 5.0/2 |
    Total comments: 1
    1  
    Bu belge de anlatılanların bazılarını test etme imkanım oldu.

    Bu Yüzden ciddiye almanızı tavsiye ederim.

    Name *:
    Email *:
    Code *: