The insider or intruder can compromise the Operational Technology (OT) assets and affect the journey of Digital Transformation (DX) when cybersecurity is not in place.
In this article, we will highlight web security issues related to Identification and Authentication Control (IAC) in OT products that might be used by manufacturers in their production plant. We will also illustrate the steps we technically conduct the assessment.
Before we conduct the assessment on these OT assets, let’s have a brief introduction of these technologies we will be shown in this article.
CODESYS Webvisu is a web-based Human Machine Interface (HMI) that provide…
802.1X port-based security is built into network devices, such as network switch and firewall to prevent unauthorized insider or intruder to access the trusted network through unprotected physical port.
802.1X port-based authentication is one of the security controls at Data Link Layer in OSI model. When 802.1X port-based authentication is configured in the network device, the following requirements shall be met by Applicant that runs Windows Operating System (OS):
“Hi, you can see who is using ProfileVisitor application to visit your personal details!” How would you react when this kind of post appearing on your Facebook feed? Many would be tempted to click on the hyperlink.
This article documented the technical findings performed for this ProfileVisitor attack that came out recently. Let’s see how the attack works!