首页> 外文期刊>Digital investigation >Leveraging the SRTP protocol for over-the-network memory acquisition of a GE Fanuc Series 90-30
【24h】

Leveraging the SRTP protocol for over-the-network memory acquisition of a GE Fanuc Series 90-30

机译:利用SRTP协议在GE Fanuc系列90-30上通过网络获取内存

获取原文
获取原文并翻译 | 示例
       

摘要

Programmable Logic Controllers (PLCs) are common components implemented across many industries such as manufacturing, water management, travel, aerospace and hospitals to name a few. Given their broad deployment in critical systems, they became and still are a common target for cyber attacks; the most prominent one being Stuxnet. Often PLCs (especially older ones) are only protected by an outer line of defense (e.g., a firewall) but once an attacker gains access to the system or the network, there might not be any other defense layers. In this scenario, a forensic investigator should not rely on the existing software as it might have been compromised. Therefore, we reverse engineered the GE-SRTP network protocol using a GE Fanuc Series 90-30 PLC and provide two major contributions: We first describe the Service Request Transport protocol (GE-SRTP) which was invented by General Electric (GE) and is used by many of their Ethernet connected controllers. Note, to the best of our knowledge, prior to this work, no publicly available documentation on the protocol was available affording users' security by obscurity. Second, based on our understanding of the protocol, we implemented a software application that allows direct network-based communication with the PLC (no intermediate server is needed). While the tool's forensic mode is harmless and only allows for reading registers, we discovered that one can manipulate/write to the registers in its default configuration, e.g., turn off the PLC, or manipulate the items/processes it controls. (C) 2017 The Author(s). Published by Elsevier Ltd. on behalf of DFRWS.
机译:可编程逻辑控制器(PLC)是在许多行业中实现的通用组件,例如制造业,水管理,旅行,航空航天和医院等。考虑到它们在关键系统中的广泛部署,它们已经成为并且仍然是网络攻击的常见目标。最突出的是Stuxnet。通常,PLC(尤其是较旧的PLC)仅受到外部防御线(例如防火墙)的保护,但是一旦攻击者获得对系统或网络的访问权限,则可能没有其他防御层。在这种情况下,法医调查员不应依赖现有的软件,因为它可能已经受到破坏。因此,我们使用GE Fanuc系列90-30 PLC对GE-SRTP网络协议进行了反向工程,并提供了两个主要贡献:我们首先描述了通用电气(GE)发明的服务请求传输协议(GE-SRTP),由许多其以太网连接的控制器使用。请注意,据我们所知,在进行此工作之前,尚无有关该协议的公开文档,这些文件通过模糊的方式为用户提供了安全性。其次,基于对协议的理解,我们实现了一个软件应用程序,该应用程序允许与PLC直接基于网络的通信(不需要中间服务器)。虽然该工具的取证模式是无害的,并且仅允许读取寄存器,但我们发现人们可以在其默认配置下对寄存器进行操作/写入,例如关闭PLC或对其控制的项目/过程进行操作。 (C)2017作者。由Elsevier Ltd.代表DFRWS发布。

著录项

  • 来源
    《Digital investigation》 |2017年第8期|S26-S38|共13页
  • 作者单位

    Univ New Haven, Cyber Forens Res & Educ Grp UNHcFREG, Tagliatela Coll Engn, ECECS, 300 Boston Post Rd, West Haven, CT 06516 USA;

    Brno Univ Technol, Fac Informat Technol, Brno, Czech Republic;

    Univ New Haven, Cyber Forens Res & Educ Grp UNHcFREG, Tagliatela Coll Engn, ECECS, 300 Boston Post Rd, West Haven, CT 06516 USA;

    Univ New Haven, Cyber Forens Res & Educ Grp UNHcFREG, Tagliatela Coll Engn, ECECS, 300 Boston Post Rd, West Haven, CT 06516 USA;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    GE Fanuc Series 90-30; Live memory acquisition; GE-SRTP protocol; SCADA; PLC;

    机译:GE Fanuc系列90-30;实时内存获取;GE-SRTP协议;SCADA;PLC;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号