ShmooCon 2013: Mastering Building Exploits with BACnet π
Discover how to exploit building automation systems using BACnet at ShmooCon 2013. Learn from Brad Bowers' expert insights on physical security vulnerabilities. Watch the full video here: http://bit.ly/shmoocon2013

Christiaan008
5.7K views β’ Mar 21, 2013

About this video
For more information and to download the video visit: http://bit.ly/shmoocon2013
Playlist ShmooCon 2013: http://bit.ly/Shmoo13
Speaker: Brad Bowers
The integration of computer technology to monitor the inner works of large office buildings, factories and plants has been evolving for years. These types of systems are often referred to as Building Automation or Building Management Systems (BMS). Companies uses these systems to monitor a myriad of sensors, gauges and alarms that provide statistics about equipment usage as well as inform technicians when a system is not functioning correctly. What use to be simple alerting has morphed into highly complex network enabled systems that provide complete operational control over such things as HVAC, elevators, electrical & water supply and even door locks and safety systems.
In this talk we'll take a closer look at how these systems work as well as an Attacker's view into the BacNET protocols. I'll be introducing a new collection of tools that pentesters and system admins could use to help identify BacNET enabled systems as well as test their solvency against attack, spoofing and denial of service.
Playlist ShmooCon 2013: http://bit.ly/Shmoo13
Speaker: Brad Bowers
The integration of computer technology to monitor the inner works of large office buildings, factories and plants has been evolving for years. These types of systems are often referred to as Building Automation or Building Management Systems (BMS). Companies uses these systems to monitor a myriad of sensors, gauges and alarms that provide statistics about equipment usage as well as inform technicians when a system is not functioning correctly. What use to be simple alerting has morphed into highly complex network enabled systems that provide complete operational control over such things as HVAC, elevators, electrical & water supply and even door locks and safety systems.
In this talk we'll take a closer look at how these systems work as well as an Attacker's view into the BacNET protocols. I'll be introducing a new collection of tools that pentesters and system admins could use to help identify BacNET enabled systems as well as test their solvency against attack, spoofing and denial of service.
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
5.7K
Likes
76
Duration
20:29
Published
Mar 21, 2013
User Reviews
4.4
(1) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.
Trending Now