Author name: techctf

SNMP enabled PLC

Exploit Dev # 9 : Remote Exploitation of SNMP Configuration in PLC – Vulnerability @ Hack-the-Box

In Exploit Development # 9 : Remote Exploitation of SNMP Configuration , we’re tackling a significant vulnerability in the Allen Bradley Micrologix 1400 Series B. This time, our focus is on the ability to remotely enable or disable the SNMP (Simple Network Management Protocol) feature. Our exploit involves sending specially crafted packets to manipulate SNMP […]

Exploit Dev # 9 : Remote Exploitation of SNMP Configuration in PLC – Vulnerability @ Hack-the-Box Read More »

Overwrite Existing PLC Programs

Exploit Development # 8 : Overwrite Existing PLC Programs Remotely – Vulnerability Analysis @ Hack-the-Box

In this chapter of Exploit Development # 8: Overwrite Existing PLC Programs Remotely, we’re diving into a crucial and bold aspect of PLC security. we’re expanding on our previous work from Exploit Development # 7, where we mastered reading PLC data remotely. In that phase, we delved deep into how to access and understand micrologix

Exploit Development # 8 : Overwrite Existing PLC Programs Remotely – Vulnerability Analysis @ Hack-the-Box Read More »

Remote Reading of PLC Data

Exploit Development # 7: Remote Reading of PLC Data: Unauthorized Access – Vulnerability Analysis @ Hack-the-Box

In this chapter of Exploit Development # 7: Remote Reading of PLC Data -Vulnerability Analysis @ Hack-the-Box, we’re diving into something that’s both critical and a bit like playing detective with PLCs. In our last adventure, we figured out how to bypass the PLC master password to read specific data. It was like unlocking a

Exploit Development # 7: Remote Reading of PLC Data: Unauthorized Access – Vulnerability Analysis @ Hack-the-Box Read More »

NVRAM Memory Fault Exploitation

Exploit Development # 6 : NVRAM Memory Fault Exploitation in PLC – Vulnerability Analysis @ Hack-the-Box

Welcome to “NVRAM Memory Fault Exploitation in PLC ” — the latest thrilling chapter in our ongoing exploration of PLC vulnerabilities! After diving into the intricacies of PLC password protection in our previous adventure. Think of NVRAM as the PLC’s secret vault, but instead of keeping things secure, it’s inviting us to poke around. We’re

Exploit Development # 6 : NVRAM Memory Fault Exploitation in PLC – Vulnerability Analysis @ Hack-the-Box Read More »

Bypassing PLC password

Exploit Development # 5 : Retrieve/Bypass/Crack/Unlock Micrologix 1400 PLC Password Protection

Welcome to “Bypass PLC Password” — the latest chapter in our thrilling exploit saga! After having a blast with various micrologix 1400 PLC forcing exploits, we’ve decided to spice things up by tackling a new puzzle: PLC password protection. Think of it as the security system’s way of saying, “Not so fast!” But don’t worry,

Exploit Development # 5 : Retrieve/Bypass/Crack/Unlock Micrologix 1400 PLC Password Protection Read More »

Exploit development : Force Digital output of PLC

Exploit Development # 4 : Attacking PLCs with Analog Output Forcing – Vulnerability Analysis @ Hack-the-Box

Welcome to “Exploit Development” series! Buckle up for “Attacking PLCs with Analog Output Forcing”—a title as dynamic as the journey we’re about to embark on! Ever wondered how to take control of PLCs and manipulate Analog Outputs? You’re in for a treat! This guide is your gateway to the art of exploiting micrologix 1400 PLC

Exploit Development # 4 : Attacking PLCs with Analog Output Forcing – Vulnerability Analysis @ Hack-the-Box Read More »

Exploit development : Force Digital output of PLC

Exploit Development # 3 : Attacking PLCs with Analog Input Forcing – Vulnerability Analysis @ Hack-the-Box

Welcome to the thrilling debut of our “Exploit Development” series! Buckle up for “Attacking PLCs with Analog Input Forcing” – a title that’s as vibrant as the adventure we’re about to undertake! Ever wondered how to take control of PLCs and manipulate those Analog inputs like a pro? You’re in for a treat! This guide

Exploit Development # 3 : Attacking PLCs with Analog Input Forcing – Vulnerability Analysis @ Hack-the-Box Read More »

Exploit development : Force Digital output of PLC

Exploit Development # 2 : Attacking PLCs with Digital Output Forcing – Vulnerability Analysis @ Hack-the-Box

Welcome to the thrilling first chapter of our “Exploit Development” series! Buckle up for “Attacking PLCs with Digital Output Forcing “ – a title that’s almost as exciting as the content itself! Ever wondered how to bend PLCs to your will and force those Digital Outputs into submission? Well, you’re in the right place! In

Exploit Development # 2 : Attacking PLCs with Digital Output Forcing – Vulnerability Analysis @ Hack-the-Box Read More »

exploit development PLC POC

Exploit Development # 1 : Attacking PLCs with Digital Input Forcing – Vulnerability Analysis @ Hack-the-Box

Welcome to the thrilling first chapter of our “Exploit Development” series! Buckle up for “Attacking PLCs with Digital Input Forcing” – a title that’s almost as exciting as the content itself! Ever wondered how to bend PLCs to your will and force those digital inputs into submission? Well, you’re in the right place! In this

Exploit Development # 1 : Attacking PLCs with Digital Input Forcing – Vulnerability Analysis @ Hack-the-Box Read More »

Scroll to Top