SCADA deep inside: protocols and security mechanisms
Revision as of 20:55, 16 July 2014 by Administrator
- In my topic I'll share my experience in analysis of most popular open and vendor's specific proprietary industrial protocols. For each protocol will be presented packet structure, real examples, (in)secure features and possible hacks. At the end of the topic I'll share my practical approach, methodology and useful scripts.