Upload

Loading icon Loading...

This video is unavailable.

Hacking Exposed: LIVE - Episode #032 - Exploiting Vulnerabilities in Critical Infrastructure

Sign in to YouTube

Sign in with your Google Account (YouTube, Google+, Gmail, Orkut, Picasa, or Chrome) to like HackingExposedLIVE's video.

Sign in to YouTube

Sign in with your Google Account (YouTube, Google+, Gmail, Orkut, Picasa, or Chrome) to dislike HackingExposedLIVE's video.

Sign in to YouTube

Sign in with your Google Account (YouTube, Google+, Gmail, Orkut, Picasa, or Chrome) to add HackingExposedLIVE's video to your playlist.

Published on Oct 3, 2012

What do critical infrastructure vendors Siemens/RuggedCom and Belden/GarrettCom have in common? Aside from being big names in a $3.7b industrial networking market, they both have serious vulnerabilities as EXPOSED by Cylance, Inc.

In this episode, Stuart McClure, lead author of the Hacking Exposed series and Founder/CEO of Cylance, Inc. is joined by Cylance, Inc. researcher Justin W. Clarke. The first exploit shown is a demo on how a simple guest account in GarrettCom's MNS-6K software can be easily escalated to an administrator level in less than 5 minutes. They also discuss in-depth and give a LIVE demo of how to reverse hard-coded SSL private keys from RuggedCom's "Rugged Operating System" (ROS.) Since these devices are "hardened" and used by power plants and other such critical infrastructure, the implications are drastic.

Follow the Hacking Exposed: LIVE team

http://www.twitter.com/hackingexposed
http://www.hackingexposed.com

Hacking Exposed: LIVE is powered by Cylance

http://www.cylance.com
http://www.facebook.com/cylanceinc
http://www.twitter.com/cylanceinc

Think Evil, Do Good.

Loading icon Loading...

Loading icon Loading...

Loading icon Loading...

The interactive transcript could not be loaded.

Loading icon Loading...

Loading icon Loading...

Ratings have been disabled for this video.
Rating is available when the video has been rented.
This feature is not available right now. Please try again later.

Loading icon Loading...

Loading...
Working...
to add this to Watch Later

Add to