Industrial Control Systems (in)security is making headlines on a regular basis recently. Why ? Are security experts crying wolf or do we have a real problem ? Learn more by understand the specificities of OT (Operational Technology) compared to IT then use this knowledgeto identify the most common vulnerabilities, exploit it on several hands-on lab systems, including real ICS software and real PLCs.
I am delighted to announce that I will give my Pentesting ICS training at Troopers next year !
Please find all information including registration at the following link: https://www.troopers.de/troopers20/trainings/jqxfau/
I am delighted to announce that I will give my brand new training at Hack in the Box Singapore in July
Please find all information including registration at the following link: https://conference.hitb.org/hitbsecconf2020sin/sessions/3-day-training-2-industrial-control-systems-build-break-secure/
On this intense 3-day training, you will learn everything you need to start pentesting Industrial Control Networks. We will cover the basics to help you understand what are the most common ICS vulnerabilities. We will then spend some time learning and exploiting Windows & Active Directory weaknesses, as most ICS are controlled by Windows systems.
This year, I attended the S4 conference in Miami South Beach for the second time. It is a great event, one of the very few cybersecurity events focused on ICS. I will try in this post to mention some of…
I was really proud to give a workshop on ICS pentesting again at DEFCON, with my colleague Alexandrine.
Hi ! Welcome to my new website dedicated to ICS pentesting, and especially the trainings I offer on the topic.
Last summer, I showcased some research on the use of Modbus protocol 0x5A function by Schneider PLCs.