Attacking the SIS controller
Attackers can gain access to the controller through a variety of methods, including brute-force password cracking, dictionary attacks, buffer overflow attacks, and serial port sniffing. Attackers can also compromise the controller OS by utilizing malicious code such as malware. This malicious code is designed to penetrate the system and transmit sensitive data to attackers for further exploitation.
Once malicious code is installed, an attacker can use the compromised system to launch attacks on other connected systems.
SIS controllers communicate directly with the HMI, EWS, and IAMS. These interfaces can be interesting entry points to attack SIS controllers:
Figure 4.11 – Safety controller attack surface
In this context, the safety controller attack surface has four distinct layers:
- The logic layer operates at the uppermost degree of abstraction within a Programmable Logic Controller (PLC) system to dictate...