Jump to content
Tuts 4 You

Anatomy of a SCADA Exploit: Part 1 – From Overflow to EIP...

Teddy Rogers

Recommended Posts

Teddy Rogers

Anatomy of a SCADA Exploit: Part 1 – From Overflow to EIP

On November 29, 2011, Luigi Auriemma published a security advisory containing multiple vulnerabilities in the 3S CoDeSys Automation Suite. Like much of the other software Auriemma has researched in past months, CoDeSys is SCADA software. For those who aren’t familiar with the term, SCADA stands for “Supervisory Control and Data Acquisition,” which is just a fancy way of saying “the code that runs big machines, assembly lines, and the utilities we rely on every day (water, electricity, etc.).” To put it more bluntly, things that should never fail and should never be messed with.



Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Create New...