Jump to content
Tuts 4 You
Sign in to follow this  
Teddy Rogers

Anatomy of a SCADA Exploit: Part 1 – From Overflow to EIP...

Recommended Posts

Teddy Rogers

Anatomy of a SCADA Exploit: Part 1 – From Overflow to EIP

On November 29, 2011, Luigi Auriemma published a security advisory containing multiple vulnerabilities in the 3S CoDeSys Automation Suite. Like much of the other software Auriemma has researched in past months, CoDeSys is SCADA software. For those who aren’t familiar with the term, SCADA stands for “Supervisory Control and Data Acquisition,” which is just a fancy way of saying “the code that runs big machines, assembly lines, and the utilities we rely on every day (water, electricity, etc.).” To put it more bluntly, things that should never fail and should never be messed with.


/>http://www.poppopret.org/?p=40

Ted.

Share this post


Link to post

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
Sign in to follow this  
×
×
  • Create New...