We received a large number of submissions, bear with us while we’re scooping across the stack!
We’ll update you on your submission status ASAP!
Thank you!
This talk is an attempt to reconstruct the technical approach that hacktivists might take to industrial control equipment.
The talk is divided into 4 main parts
The importance of using an isolated environment to test this exploit, with the example of an OT lab setup.
Explanations of the operating principles of a PLC, and the choice of attack surface, as well as the attack itself.
The search for vulnerable equipment on the Internet using several tools, and the use of OSINT APIs. With a second verification of the existence of the equipment.
Comparison of the approach with other activist groups, and an attempt at market research.
We received a large number of submissions, bear with us while we’re scooping across the stack!
We’ll update you on your submission status ASAP!
Thank you!
Early Birds had been raffled!
STANDARD TICKETS are still available but flying away, quick!
For the 20th year, leHACK will host a prestigious talk lineup.
Wether you are a security researcher, a hacker,a freak, or a unicorn, you can come on stage and share your unique knowledge with your pairs.