Upload

Loading...

Hacking Exposed: LIVE - Episode #032 - Exploiting Vulnerabilities in Critical Infrastructure

9,494

Loading...

Loading...

Transcript

The interactive transcript could not be loaded.

Loading...

Loading...

Rating is available when the video has been rented.
This feature is not available right now. Please try again later.
Published on Oct 3, 2012

What do critical infrastructure vendors Siemens/RuggedCom and Belden/GarrettCom have in common? Aside from being big names in a $3.7b industrial networking market, they both have serious vulnerabilities as EXPOSED by Cylance, Inc.

In this episode, Stuart McClure, lead author of the Hacking Exposed series and Founder/CEO of Cylance, Inc. is joined by Cylance, Inc. researcher Justin W. Clarke. The first exploit shown is a demo on how a simple guest account in GarrettCom's MNS-6K software can be easily escalated to an administrator level in less than 5 minutes. They also discuss in-depth and give a LIVE demo of how to reverse hard-coded SSL private keys from RuggedCom's "Rugged Operating System" (ROS.) Since these devices are "hardened" and used by power plants and other such critical infrastructure, the implications are drastic.

Follow the Hacking Exposed: LIVE team

http://www.twitter.com/hackingexposed
http://www.hackingexposed.com

Hacking Exposed: LIVE is powered by Cylance

http://www.cylance.com
http://www.facebook.com/cylanceinc
http://www.twitter.com/cylanceinc

Think Evil, Do Good.

Loading...

When autoplay is enabled, a suggested video will automatically play next.

Up Next


to add this to Watch Later

Add to

Loading playlists...