DEMONSTRATION OF AN ICS ATTACK CHAIN USING NON-TECHNICAL EXPLOITATION TECHNIQUES
December 13, 2018
USA (United States of America)
In industrial environments segmentation between IT and OT systems is paramount. It is no longer enough to perform network segmentation alone; instead, domain, application, and platform segmentation is equally as important. Attackers are exploiting domain trusts, credential re-use, and shared management applications which creates attack chains with non-traditional exploitation. In this webinar, we will be enumerating and exploiting the IT/OT boundary by focusing on its a feature, not a bug.