Aircraft Hacking Practical Aero Series
|
|
|
- Ashlie Bridges
- 10 years ago
- Views:
Transcription
1 Aircraft Hacking Practical Aero Series
2 IT Security Commercial Pilot Hugo Teso One and a half architecture Aero Series
3 Agenda Part 1: The $PATH to the exploit Part 2: The $PATH to exploit Disclaimer Time constraints Too much to explain Aircrafts!= Computers Safety reasons Still too much to fix
4 Part 1 The $PATH to the exploit
5 The Target In the beginning there was The Question Would I be able to convert THIS......into THIS?
6 The Answer
7 Today s Answer
8 Attack Overview Discovery: ADS-B Info gathering: ACARS Exploitation: Via ACARS Against on-board systems vulns. Post-Exploitation: Party hard!
9 ADS-B 101 Automatic Dependent Surveillance-Broadcast Radar substitute Position, velocity, identification, and other ATC/ATM-related information. ADS-B has a data rate of 1 Mbit/sec. Used for locating and plotting targets
10 ADS-B Security None at all Attacks range from passive attacks (eavesdropping) to active attacks (message jamming, replaying, injection). Target selection Public Data Virtual Aircrafts Local data (SDR*) * Software Defined Radio
11 ACARS 101 Aircraft Communications Addressing and Reporting System Digital datalink for transmission of messages between aircraft and ground stations Multiple data can be sent from the ground to the A/C * Used for passive OS fingerprinting and plotting targets * Aircraft
12 ACARS Security None at all sometimes monoalphabetic ciphers Detailed flight and Aircraft information Public DB Local data (SDR) Virtual Aircrafts Ground Service Providers Two main players Worldwide coverage
13 FMS 101 Flight Management System typically consists of two units: A computer unit A control display unit Control Display Unit (CDU or MCDU) provides the primary human/machine interface for data entry and information display. FMS provides: Navigation Guidance Flight planning Trajectory prediction Performance computations
14 FMS Goal: Exploit the FMS Using ACARS to upload FMS data Many different data types available Upload options: Software Defined Radio Ground Service Providers The path to the exploit: Audit aircraft code searching for vulnerabilities We use a lab with virtual airplanes but real aircraft code and HW
15 Aircraft Hardware and Software The good old... ebay!! Russian scrapings You name it Loving salesman Value-added products Third party vendors /wp-admin... Sigh Resentful users or former employees
16
17
18
19
20
21
22
23
24
25
26
27 The Lab A/C == Aircraft SDR == Software Defined Radio
28 The Lab
29 FMS vulnerabilities Many different data types to upload Many FMS manufacturers, models and versions. Architectures: PPC (Lab x86) Language: mostly ADA (old ones) SO RTOS realm: DeOS VxWorks ACARS: ACARS datalink allows real time (avg of 11s delay) data transmission Size: Max 220 chars * 16 blocks :S
30 ACARS Messages during flight Ekaterinburg - Oct 09 ENG.pdf
31 Demo
32 Part II The $PATH to exploit
33 SITA/ARINC Société Internationale de Télécommunications Aéronautiques (SITA) IT and telecommunication services to the air transport industry. 90% of the world's airline business. Aeronautical Radio, Incorporated (ARINC) Major provider of transport communications and systems solutions: Aviation, airports, defense, government, healthcare, networks, security, and transportation.
34 Access methods: Clients SMTP / POP3 Lotus Notes Desktop Apps, connection over: X.25 TCP MQ Series (IBM WebSphere) MSMQ (Microsoft queues) MS SQL Database ORACLE Database Web App Mobility Printer SDK Mobile App Pager/SMS Be my guest... What could possibly go WRONG? Stations Ekaterinburg - Oct 09 ENG.pdf
35 Software Defined Radio 101 A radio communication system where components that have been typically implemented in hardware are instead implemented by means of software. HW: USRP1/USRP2 Universal Software Radio Peripheral USB or Gigabit Ethernet link SW: GNU Radio LabVIEW, MATLAB and Simulink SDK that provides signal processing blocks to implement software radios. Python/C++
36 Post-Exploitation Consolidation Protection & Monitoring Communication Two way communication Expansion Other systems Back to Discovery Smiths Aerospace chose Wind River Systems' VxWorks 653 RTOS for the B787's common core system (CCS), a cabinet that will host 80 to 100 applications, including Honeywell's FMS and health management software and Collins' crew alerting and display management software
37
38 Aircraft Post-Exploitation Aircraft and Pilots Predictables Checklists and procedures Exploiting other comm and nav systems or protocols Planning and timing! C&C Two way communication Actions Limitations
39 SIMON Why SIMON? Multi-stage payload Control ADS-B/ACARS Upload via ADS-B/ACARS Persistence Stealthness (No Rootkit) Accept and inject: FP/DB Payloads (scripts) Plugins (code) Commands Two way comm 2013, n.runs Professionals - Security Research Team - April 2013 Hugo Teso
40 Demo
41 Conclusions
42 Remediation Safety!= Security Where to start from? NextGen Security On-board systems security audit Who is affected? Manufacturers Airlines Ground Service Providers We are working with EASA to improve the situation
43 References Aviation ADS-B dependent_surveillance-broadcast 12-briefings.html#Costin ACARS Communications_Addressing_and_Reporting_ System FMS management_system SDR radio
44 @kuasar Many others Hugo Teso
Civil Aviation and CyberSecurity Dr. Daniel P. Johnson Honeywell Aerospace Advanced Technology
Civil Aviation and CyberSecurity Dr. Daniel P. Johnson Honeywell Aerospace Advanced Technology Outline Scope Civil aviation regulation History Cybersecurity threats Cybersecurity controls and technology
Cyber-hijacking Airplanes:
Cyber-hijacking Airplanes: Truth or Fiction? Dr. Phil of Bloomsburg University @ppolstra http://philpolstra.com Captain Polly of University of @CaptPolly Why This Talk? Lots of bold claims concerning
SAGEM FOQA Hardware & Software
SAGEM FOQA Hardware & Software SAFRAN GROUP SAGEM SA COMMUNICATIONS DIVISION DEFENSE DIVISION AUTOMOTIVE DIVISION Propulsion Branch Equipment Branch SECURITY DEFENSE AVIONICS SAFRAN = 60% of an Aircraft
Evolution in Regional Aircraft Avionics
Evolution in Regional Aircraft Avionics November, 2008 Agenda Evolution in Requirements from Takeoff to Touchdown Flight Deck Evolution Overview Communication Navigation Surveillance Displays and Situational
Understanding Compliance with Automatic Dependent Surveillance Broadcast (ADS-B) Out
Understanding Compliance with Automatic Dependent Surveillance Broadcast (ADS-B) Out White Paper Doc No.: WHTP-2013-14-05 Revised, October 2014 Safely guiding pilots and their passengers worldwide for
ARINC 653. An Avionics Standard for Safe, Partitioned Systems
ARINC 653 An Avionics Standard for Safe, Partitioned Systems 1 Courtesy of Wind River Inc. 2008 IEEE-CS Seminar June 4 th, 2008 Agenda Aerospace Trends IMA vs. Federated ARINC 653 Main concepts Safety
Aircraft Tracking & Flight Data Recovery
Airframer view Presented by: Claude Pichavant Aircraft Tracking & Flight Data Recovery Aircraft Tracking & Flight Data Recovery Airbus has contributed to the Aircraft Tracking Task Force (ATTF), to the
ADS-B is intended to transform air traffic control by providing more accurate and reliable tracking of airplanes in flight and on the ground.
ADS-B is intended to transform air traffic control by providing more accurate and reliable tracking of airplanes in flight and on the ground. New Air Traffic Surveillance Technology Air traffic service
Hayri Tarhan, Sr. Manager, Public Sector Security, Oracle Ron Carovano, Manager, Business Development, F5 Networks
EXTENDING ACCESS WHILE ENHANCING CONTROL FOR YOUR ORGANIZATION S DATA LEVERAGE THE POWER OF F5 AND ORACLE TO DELIVER SECURE ACCESS TO APPLICATIONS AND DATABASES Hayri Tarhan, Sr. Manager, Public Sector
C-130 Fleet CNS/ATM Solutions
C-130 Fleet CNS/ATM Solutions Steve Knoblock Lockheed Martin Flight Operations [email protected] 770-351-6353 INFORMATION CONTAINED IN THIS BRIEFING IS FOR REFERENCE PURPOSES ONLY AND DOES NOT
Microsoft Technologies
NETWORK ENGINEERING TRACK Microsoft Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use
Australian Enhanced Flight Tracking Evaluation Performance Report. August 2015
Australian Enhanced Flight Tracking Evaluation Performance Report August 2015 Contents 1.0 Executive Summary... 1 2.0 Background... 3 3.0 Evaluation Outline and Objectives... 5 3.1 Concept of Operations...
Notes and terms of conditions. Vendor shall note the following terms and conditions/ information before they submit their quote.
Specifications for ARINC 653 compliant RTOS & Development Environment Notes and terms of conditions Vendor shall note the following terms and conditions/ information before they submit their quote. 1.
Communication Management Unit : Single Solution of Voice and Data Routing Unit
Defence Science Journal, Vol. 63, No. 2, March 2013, pp. 181-185, DOI: 10.14429/dsj.63.4261 2013, DESIDOC SHORT COMMUNICATION Communication Management Unit : Single Solution of Voice and Data Routing Unit
With all of the new hype the
T E C H N O L O G Y All About MODE S TRANSPONDERS B Y T O N Y B A I L E Y Air Traffic Control Radio Beacon System (ATCRBS) With all of the new hype the past few months concerning Elementary Surveillance
Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications
NETWORK ENGINEERING TRACK Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use Office
GPS SPOOFING. Low-cost GPS simulator. HUANG Lin, YANG Qing Unicorn Team Radio and Hardware Security Research Qihoo 360 Technology Co. Ltd.
GPS SPOOFING Low-cost GPS simulator HUANG Lin, YANG Qing Unicorn Team Radio and Hardware Security Research Qihoo 360 Technology Co. Ltd. Who we are? Unicorn Team Qihoo360 s UnicornTeam consists of a group
Web Application Hacking (Penetration Testing) 5-day Hands-On Course
Web Application Hacking (Penetration Testing) 5-day Hands-On Course Web Application Hacking (Penetration Testing) 5-day Hands-On Course Course Description Our web sites are under attack on a daily basis
Mobile Technology: Learn About Managing Mobility
Mobile Technology: Learn About Managing Mobility Presenters: Chris Kiley, Jeppesen Director, Mobile & Web Solutions, UxD Michelle Burnett, AirWatch Learn about. What you will learn/take away from today
SESAR Air Traffic Management Modernization. Honeywell Aerospace Advanced Technology June 2014
SESAR Air Traffic Management Modernization Honeywell Aerospace Advanced Technology June 2014 Honeywell in NextGen and SESAR Honeywell active in multiple FAA NextGen projects ADS-B Surface Indicating and
Policy Regarding Datalink Communications Recording Requirements. AGENCY: Federal Aviation Administration (FAA), Department of Transportation (DOT).
[4910-13] DEPARTMENT OF TRANSPORTATION Federal Aviation Administration 14 CFR Parts 91, 121, 125, and 135 [Docket No. FAA 2015-0289] Policy Regarding Datalink Communications Recording Requirements AGENCY:
EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.
CENTER FOR ADVANCED SECURITY TRAINING 619 Advanced SQLi Attacks and Countermeasures Make The Difference About Center of Advanced Security Training () The rapidly evolving information security landscape
ROCKWELL COLLINS FLIGHT INFORMATION MANAGEMENT SYSTEM (FIMS) Real-time information management in the cockpit.
ROCKWELL COLLINS FLIGHT INFORMATION MANAGEMENT SYSTEM (FIMS) Real-time information management in the cockpit. Your access to the battlespace just went airborne. At Rockwell Collins, we leverage our vast
Trends in Aeronautical Information Management
Trends in Aeronautical Information Management AIXM 5 Public Design Review February 7-8, 2006 Washington DC 1 Our objective in this briefing is to tell you about an emerging standard for aeronautical data
Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015
Arrow ECS University 2015 Radware Hybrid Cloud WAF Service 9 Ottobre 2015 Get to Know Radware 2 Our Track Record Company Growth Over 10,000 Customers USD Millions 200.00 150.00 32% 144.1 16% 167.0 15%
Web Application Security Payloads. Andrés Riancho Director of Web Security OWASP AppSec USA 2011 - Minneapolis
Web Application Security Payloads Andrés Riancho Director of Web Security OWASP AppSec USA 2011 - Minneapolis Topics Short w3af introduction Automating Web application exploitation The problem and how
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4 Gordon MacKay Digital Defense, Inc. Chris Wysopal Veracode Session ID: Session Classification: ASEC-W25 Intermediate AGENDA Risk Management Challenges
WHITEPAPER. Nessus Exploit Integration
Nessus Exploit Integration v2 Tenable Network Security has committed to providing context around vulnerabilities, and correlating them to other sources, such as available exploits. We currently pull information
CAUSES OF AIRCRAFT ACCIDENTS
CAUSES OF AIRCRAFT ACCIDENTS 10 th Week (9.00 am 10.30 am) 3 rd Oct 2009 (Friday) COURSE : DIPLOMA IN AVIATION MANAGEMENT MODULE : AVIATION SAFETY AND SECURITY (AVS 2104) 1 LEARNING OBJECTIVES Understand
White Paper Mode S and the European Mandates
White Paper Mode S and the European Mandates The Elementary Surveillance Mandate Mode S and the European Mandate Page 1 of 7 Honeywell For several years, the International Civil Aviation Organization (ICAO)
Introduction to ACARS Messaging Services
Introduction to ACARS Messaging Services As implemented via Iridium satellite link 2006 April 17, Preliminary Release Table of Contents 1.0 Acronyms and Abbreviations...3 2.0 Additional References......
Rapid Modular Software Integration (RMSI)
Rapid Modular Software Integration (RMSI) Adam Grimm [email protected] Overview RMSI Overview Future Airborne Compatibility Environment (FACE ) Analog Computer Rehost Integration of Modular Components
N02-IBM Managed File Transfer Technical Mastery Test v1
N02-IBM Managed File Transfer Technical Mastery Test v1 Number: 000-N02 Passing Score: 750 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ The IBM/Sterling Managed File Transfer Suite
Security in SCADA solutions
Security in SCADA solutions Green Hills Software Peter Hoogenboom Engineering Manager - EMEA 2011 Green Hills Software D&E Event, 22 Sep 2011, Evoluon Eindhoven (NL) Slide 1 Security in SCADA solutions
Best Practices for Consolidation Projects
Best Practices for Consolidation Projects Lynne Glickman Solution Architect Hewlett-Packard 2004 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without
WebSphere MQ Managed File Transfer. Parineeta Mattur
WebSphere MQ Managed File Transfer Parineeta Mattur Agenda Basic FTP What is Managed File Transfer? WebSphere MQ File Transfer Edition The Three Key Components of FTE Integration with MQ Networks Data
Aerospace Cyber Physical Systems Challenges in Commercial Aviation
Aerospace Cyber Physical Systems Challenges in Commercial Aviation Dr. Susan X. Ying, Dr. Steven Venema, Dr. David Corman, Dr. Ian Angus, and Dr. Radhakrishna Sampigethaya Boeing Research and Technology
Web Application Security
Web Application Security Ng Wee Kai Senior Security Consultant PulseSecure Pte Ltd About PulseSecure IT Security Consulting Company Part of Consortium in IDA (T) 606 Term Tender Cover most of the IT Security
Post-Access Cyber Defense
Post-Access Cyber Defense Dr. Vipin Swarup Chief Scientist, Cyber Security The MITRE Corporation November 2015 Approved for Public Release; Distribution Unlimited. 15-3647. 2 Cyber Security Technical Center
Air Traffic Controllers use StarCaster ATIS software to create, update and verify the contents of ATIS messages
starcaster A a clear voice for for aviation aviation ATIS Datasheet Email: [email protected] Tel: +1.250.477.0544 (GMT-8) ATIS (Automatic Terminal Information Service) is a comprehensive solution for
Comparison of versions 7.5 and 9.2. IBM License Metric Tool & Software Use Analysis Questions and Answers ILMT Central Team
Comparison of versions 7.5 and 9.2 IBM License Metric Tool & Software Use Analysis Questions and Answers ILMT Central Team Agenda 01 Introduction 05 SwKBT (SUA only) 09 Demo 02 Operating systems 06 Agent
Opening the Airspace for UAS
Opening the Airspace for UAS Lambert Dopping- Hepenstal, FREng ASTRAEA Programme Director RAeS UAS Operations Conference September 2012 Contents What are the aims of ASTRAEA? Why is it important? What
AVIATION INVESTIGATION REPORT A02P0004 OPERATING IRREGULARITY
AVIATION INVESTIGATION REPORT A02P0004 OPERATING IRREGULARITY NAV CANADA COMMUNICATIONS EQUIPMENT FAILURE VANCOUVER AREA CONTROL CENTRE 04 JANUARY 2002 The Transportation Safety Board of Canada (TSB) investigated
CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)
CORE Security and the Payment Card Industry Data Security Standard (PCI DSS) Addressing the PCI DSS with Predictive Security Intelligence Solutions from CORE Security CORE Security +1 617.399-6980 [email protected]
Tuesday, March 18, 2014 4:00 p.m. 5:30 p.m. MODERATED BY: Carey Miller Universal Avionics Systems Corp.
Avionics Tuesday, March 18, 2014 4:00 p.m. 5:30 p.m. MODERATED BY: Carey Miller Universal Avionics Systems Corp. International Operators Conference Tampa, FL March 17 20, 2014 Previous NBAA IOC s 2013
Penetration: from Application down to OS
April 13, 2010 Penetration: from Application down to OS Getting OS Access Using Lotus Domino Application Server Vulnerabilities Digitаl Security Research Group (DSecRG) www.dsecrg.com Alexandr Polyakov.
Attacks from the Inside
Attacks from the Inside Eddy Willems, G Data Righard J. Zwienenberg, Norman Attacks from the Inside. Agenda - Social Networking / Engineering - Where are the threats coming from - Infection vectors - The
THE INTERNET OF THINGS IN COMMERCIAL AVIATION
THE INTERNET OF THINGS IN COMMERCIAL AVIATION INNOVATORS START HERE. EXECUTIVE SUMMARY The Internet of Things (IoT) can be summed up in one word: opportunity. By connecting devices and data, IoT presents
Appendice 1 al Regolamento ENAC ATSEP Basic training Shared
Regolamento ENAC ATSEP Appendici Pag. 1 Appendice 1 al Regolamento ENAC ATSEP Basic training Shared Subject 1: INDUCTION TOPIC 1 BASIND Induction Sub-topic 1.1 BASIND Training and Assessment Overview Sub-topic
INFORMATION SECURITY TRAINING CATALOG (2015)
INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2015) Revision 3.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,
SECURITY: THE KEY TO AFFORDABLE UNMANNED AIRCRAFT SYSTEMS. By Alex Wilson, Director of Business Development, Aerospace and Defense
SECURITY: THE KEY TO AFFORDABLE UNMANNED AIRCRAFT SYSTEMS By Alex Wilson, Director of Business Development, Aerospace and Defense EXECUTIVE SUMMARY Cost efficiency and affordability will always be key
SITA AIRCOM Service (VHF & Satellite)
SITA AIRCOM Service (VHF & Satellite) Safety in the Air 2009 Montego Bay, Jamaica, January 28-29, 2009 Adriana Mattos ATM Business Development Manager Latin America and Caribbean Agenda SITA Ground Network
2. Highlights and Updates: ITSM for Databases
IBM Tivoli Storage Manager Data Protection for Oracle Neil Rasmussen Software Development for Tivoli Data Protection Tivoli Software, IBM SWG [email protected] Agenda 1. Overview: Tivoli Storage Manager
Automatic Dependent Surveillance Broadcast (ADS-B)
Automatic Dependent Surveillance Broadcast () Surveillance development for Air Traffic Management As air traffic is predicted to increase steadily over the coming years, there is a clear need to ensure
Penetration Testing. NTS330 Unit 1 Penetration V1.0. February 20, 2011. Juan Ortega. Juan Ortega, [email protected]. 1 Juan Ortega, juaorteg@uat.
1 Penetration Testing NTS330 Unit 1 Penetration V1.0 February 20, 2011 Juan Ortega Juan Ortega, [email protected] 1 Juan Ortega, [email protected] 2 Document Properties Title Version V1.0 Author Pen-testers
Cyber Physical Systems An Aerospace Industry Perspective
Cyber Physical Systems An Aerospace Industry Perspective Don Winter VP- Boeing Phantom Works Nov 2008 BOEING is a trademark of Boeing Management Company. This document does not contain technical data as
Web Security. Discovering, Analyzing and Mitigating Web Security Threats
Web Security Discovering, Analyzing and Mitigating Web Security Threats Expectations and Outcomes Mitigation strategies from an infrastructure, architecture, and coding perspective Real-world implementations
PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access
The Best First for Beginners who want to become Penetration Testers PTSv2 in pills: Self-paced, online, flexible access 900+ interactive slides and 3 hours of video material Interactive and guided learning
Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.
Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0 Page 1 of 9 Table of Contents Table of Contents... 2 Executive Summary...
Automated Engine & LLP Hard Time Tracking: Moving on from manual records.
Automated Engine & LLP Hard Time Tracking: Moving on from manual records. Aero-Engines Europe Conference, Paris, 22 nd October 2015 AES-CIR-15-39 1 Established 2000. Dublin, IRL. Technical Service Provider
PENTEST. Pentest Services. VoIP & Web. www.novacybersecurity.com
PENTEST VoIP & Web Pentest Services VoIP & WEB Penetration Testing The Experinced and National VoIP/Unified Communications R&D organization, NETAŞ NOVA Pentest Services test the applications, infrastructure
AERONAUTICAL COMMUNICATIONS PANEL (ACP) ATN and IP
AERONAUTICAL COMMUNICATIONS PANEL (ACP) Working Group I - 7 th Meeting Móntreal, Canada 2 6 June 2008 Agenda Item x : ATN and IP Information Paper Presented by Naoki Kanada Electronic Navigation Research
EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY
EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY Dean Frye Sourcefire Session ID: SEC-W05 Session Classification: Intermediate Industrialisation of Threat Factories Goal: Glory,
ASL IT Security Advanced Web Exploitation Kung Fu V2.0
ASL IT Security Advanced Web Exploitation Kung Fu V2.0 A S L I T S e c u r i t y P v t L t d. Page 1 Overview: There is a lot more in modern day web exploitation than the good old alert( xss ) and union
Invitation to Dialogue
Kim Gram June 2013 The most important thing we build is trust AEROSPACE AND SECURITY DIVISION Aerospace Communications Antenna Systems Commercial Systems SATCOM Tactical Communications and Surveillance
McAfee Endpoint Protection Products
McAfee Total Protection Security Overview for MEEC Sumeet Gohri, CISSP Sr. Sales Engineer GovED + Healthcare McAfee, Inc. Agenda Protection Challenges McAfee Protection Products McAfee epo walkthrough
Top 10 Database. Misconfigurations. [email protected]
Top 10 Database Vulnerabilities and Misconfigurations Mark Trinidad [email protected] Some Newsworthy Breaches From 2011 2 In 2012.. Hackers carry 2011 momentum in 2012 Data theft, hacktivism, espionage
AutoPilot Middleware-Centric Application Performance Monitoring
AutoPilot Middleware-Centric Application Performance Monitoring NASTEL Technologies, Europe 57, esplanade du Général de Gaulle 92081 Paris La Défense +33 1 46 96 54 85 Raphael SABLON, Managing Director
State of The Art: Automated Black Box Web Application Vulnerability Testing. Jason Bau, Elie Bursztein, Divij Gupta, John Mitchell
Stanford Computer Security Lab State of The Art: Automated Black Box Web Application Vulnerability Testing, Elie Bursztein, Divij Gupta, John Mitchell Background Web Application Vulnerability Protection
Installation and Configuration Guide for Windows and Linux
Installation and Configuration Guide for Windows and Linux vcenter Operations Manager 5.7 This document supports the version of each product listed and supports all subsequent versions until the document
Integrating Electronic Security into the Control Systems Environment: differences IT vs. Control Systems. Enzo M. Tieghi etieghi@visionautomation.
Integrating Electronic Security into the Control Systems Environment: differences IT vs. Control Systems Enzo M. Tieghi [email protected] Security IT & Control System Security: where are we?
Flight Processor Virtualization
National Aeronautics and Space Administration Flight Processor Virtualization Alan Cudmore / Code 582 9/11/2013 www.nasa.gov 1 Agenda Introduction to Virtualization Benefits of Virtualization for Satellite
Item 5.2. 3 rd International Transport Forum. Big Data to monitor air and maritime transport. Paris, 17-18 March 2016
3 rd International Transport Forum Paris, 17-18 March 2016 Item 5.2 Big Data to monitor air and maritime transport DG EUROSTAT - Anna Białas-Motyl, Transport statistics & TF Big Data Content Big Data at
PRESENTATION. Patrick Ky Executive Director EUROPEAN COMMISSION
EUROPEAN COMMISSION PRESENTATION Patrick Ky Executive Director EUROPEAN COMMISSION WHY SESAR? EUROPEAN COMMISSION EUROPEAN CHALLENGES: Capacity: Air Traffic to double by 2030 Safety: Improvements linked
Payment Card Industry (PCI) Data Security Standard
Payment Card Industry (PCI) Data Security Standard Technical and Operational Requirements for Approved Scanning Vendors (ASVs) Version 1.1 Release: September 2006 Table of Contents Introduction...1-1 Naming
5 Steps to Advanced Threat Protection
5 Steps to Advanced Threat Protection Agenda Endpoint Protection Gap Profile of Advanced Threats Consensus Audit Guidelines 5 Steps to Advanced Threat Protection Resources 20 Years of Chasing Malicious
Deep Security/Intrusion Defense Firewall - IDS/IPS Coverage Statistics and Comparison
Deep Security/Intrusion Defense Firewall - IDS/IPS Trend Micro, Incorporated A technical brief summarizing vulnerability coverage provided by Deep Security and Intrusion Defense Firewall. The document
Deep Discovery. Technical details
Deep Discovery Technical details Deep Discovery Technologies DETECT Entry point Lateral Movement Exfiltration 360 Approach Network Monitoring Content Inspection Document Emulation Payload Download Behavior
Information Management Systems and Connectivity. David Poltorak Vice President, Aviation & Network Services Cancun, June 2014
Information Management Systems and Connectivity David Poltorak Vice President, Aviation & Network Services Cancun, June 2014 2014 Rockwell 2014 Collins. Rockwell Collins. Who we are A global company operating
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION Prepared for the NRC Fuel Cycle Cyber Security Threat Conference Presented by: Jon Chugg, Ken Rohde Organization(s): INL Date: May 30, 2013 Disclaimer
Security in Vehicle Networks
Security in Vehicle Networks Armin Happel, Christof Ebert Stuttgart, 17. March 2015 V1.1 2015-04-28 Introduction Vector Consulting Services supports clients worldwide in improving their product development
(WAPT) Web Application Penetration Testing
(WAPT) Web Application Penetration Testing Module 0: Introduction 1. Introduction to the course. 2. How to get most out of the course 3. Resources you will need for the course 4. What is WAPT? Module 1:
Addonics T E C H N O L O G I E S. NAS Adapter. Model: NASU2. 1.0 Key Features
1.0 Key Features Addonics T E C H N O L O G I E S NAS Adapter Model: NASU2 User Manual Convert any USB 2.0 / 1.1 mass storage device into a Network Attached Storage device Great for adding Addonics Storage
Learning security through insecurity
Learning security through insecurity Michael Sonntag Institute for Information processing and microprocessor technology (FIM) Johannes Kepler University Linz, Austria [email protected] 1 Web application
Rockwell Collins ARINC MultiLink SM flight tracking service
Rockwell Collins ARINC MultiLink SM flight tracking service Background Each time a highly publicized event involving a commercial airline occurs, the aviation community begins to clamor for automated transponders
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities Learning Objectives Name the common categories of vulnerabilities Discuss common system
Integrated Threat & Security Management.
Integrated Threat & Security Management. SOLUTION OVERVIEW Vulnerability Assessment for Web Applications Fully Automated Web Crawling and Reporting Minimal Website Training or Learning Required Most Accurate
FAA AIRCRAFT SYSTEMS INFORMATION SECURITY PROTECTION OVERVIEW. Abstract
FAA AIRCRAFT SYSTEMS INFORMATION SECURITY PROTECTION OVERVIEW Peter Skaves, Chief Scientific & Technical Advisor for Advanced Avionics, FAA, Renton, WA Background (FAA) The Federal Aviation Administration
https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting
https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting Chapter 1 1. Introducing Penetration Testing 1.1 What is penetration testing 1.2 Different types of test 1.2.1 External Tests
A Binary Tree SMART Migration Webinar. SMART Solutions for Notes- to- Exchange Migrations
A Binary Tree SMART Migration Webinar SMART Solutions for Notes- to- Exchange Migrations Critical Success Factors of Enterprise Migrations from Notes/Domino to Exchange Secure integration of mail systems
Protecting Sensitive Data Reducing Risk with Oracle Database Security
Protecting Sensitive Data Reducing Risk with Oracle Database Security [email protected] Information Security Architect Agenda 1 2 Anatomy of an Attack Three Steps to Securing an Oracle Database
