Delhaye & Dola Making your own Stuxnet Exploiting New Vulns and Voodooing PLCs

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=aWtGAe8birk



Duration: 46:18
1 views
0


ROMHACK 2021 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2024-02-19Le Toux How to impress your management when you are an Active Directory noob
2024-02-19live streaming
2024-02-19Luca Massarelli SAFE Self Attentive Function Embedding for Binary Similarity
2024-02-19Orange & Chang Infiltrating Corporate Intra Like NSA Pre auth RCE on Leading SSL VPNs
2024-02-19Photos
2024-02-19Raffaele Di Taranto, Vito Lucatorto From 0 to Hero Actionable Threat Intelligence
2024-02-19Cocomazzi Win Priv Esc Still abusing local service accounts to get SYSTEM priv
2024-02-19Leo Di Donato Falco runtime security analysis through syscalls
2024-02-19Marcello Salvati BYOI Bring Your Own Interpreter payloads
2024-02-19Pawel Rzepa Serverless security attack & defense
2024-02-19Delhaye & Dola Making your own Stuxnet Exploiting New Vulns and Voodooing PLCs
2024-02-19Dirk jan Mollema Breaking Azure AD joined endpoints in zero trust environments
2024-02-19Folini Securing Access to Internet Voting with the OWASP ModSecurity Core Rule Set
2024-02-19Full Conference
2024-02-19Luke Hinds sigstore, software signing for the masses
2024-02-19Marco Ivaldi My last Solaris talk not your average keynote
2024-02-19Antonio Morales Fuzzing Apache HTTP Server for fun and CVEs
2024-02-19Edoardo Rosa You shall not PassRole
2024-02-19James Forshaw The Vendor Researcher Relationship Needs Improvement
2024-02-19Markus Vervier and Yasar Klawohn DES On Fire Breaking Physical Access Control
2024-02-18Nestori Syynimaa Attacking AAD abusing Synch API The story behind 40k$ bounties



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering