Nytro Posted January 1, 2013 Report Posted January 1, 2013 Scada Strangelove Description: SCADA STRANGELOVEor: How I Learned to Start Worrying and Love Nuclear PlantsModern civilization unconditionally depends on information systems. It is paradoxical but true that ICS/SCADA systems are the most insecure systems in the world. From network to application, SCADA is full of configuration issues and vulnerabilities.During our report, we will demonstrate how to obtain full access to a plant via:a sniffer and a packet generatorFTP and TelnetMetasploit and oslqa webserver and a browserAbout 20 new vulnerabilities in common SCADA systems including Simatic WinCC will be revealed.Releases:modbuspatrol (mbpatrol) – free tool to discover and fingerprint PLCSimatic WinCC security checklistSimatic WinCC forensic checklist and toolsclose to real life attack scenario of a Simatic WinCC based plantIntro1.1 Who we are?1.2 History of researchOverview of ICS/SCADA architectureSCADA network puzzle3.1 Overview of protocols used in SCADA networks3.2 Modbus overview3.3 S7 overview3.4 Modbus/S7 SCADA/PLC fingerprint (release mbpatrol - free tool for PLC fingerprint)Who is mister PLC?4.1. Typical PLC architecture4.2. Security and configuration issues4.3. Coordinated disclosure of vulnerabilities in several PLCDEMO. Owning plant with ftp and telnet. During demo, I will demonstrate how several vulnerabilities and configuration issues of PLC can be used to get root access to the device, install rootkit and manipulate something in real world.Miss SCADA6.1. Place of OS and DB in security of SCADA infrastructure6.2. Simatic WinCC default configuration issues6.3. Ways to abuse OS and DB vulnerabilities6.4. Coordinated disclosure of several OS/DB WinCC vulnerabilities6.5. Simatic WinCC security checklist6.6. Simatic WinCC postexploitation/forensicHeavy weapon7.1. SCADA/HMI application architecture (based on Simatic WinCC)7.2. Clients-side in SCADA network? (release of client-site fingerprint tool for HMI software)7.3. Coordinated disclosure of vulnerabilities in Siemens Simatic WinCC 7.0 used in exploit.Architecture of exploitDEMO. Owning plant with browser. Exploit scenario. Several 0-day (but responsible disclosed) vulnerabilities in Siemens Simatic WinCC 7.0 used to:Fingerprint presence of WinCC client softwareObtain access password to WinCC WebNavigator interfaceRead registry and files on WinCC boxView and manage HMI /PLC/technological process from internet via browser of operator10 PS. Why physical separation is not enoughWill we tell about 0-day vulnerabilities? Yes, but we will coordinate with vendor. So list of vulnerabilities depended on patching speed of Siemens.Will instruments be presented?29C3: SCADA Strangelove Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying. Original Source: Sursa: Scada Strangelove Quote