1. Pulling Firmware Without a Trace 2. Hacking Siemens Programmable Controllers
Details
The Ring Around - pulling firmware without a trace - Peter (rankstar)
The first step to hardware hacking is gaining access to the code. This talks shows the hardware reversing steps you can employ to dump an MMC flash chip without removing it from the PCB. By not removing the chip, you can change the OS to enabled better access (SSH, telnet) or remove crapwhere like cloud connectivity - no desoldering required! -
LOGO!8 BM 24RCE - Harry & Zoi
Thales AU In this talk, we’ll walk through how our team uncovered a chain of vulnerabilities in Siemens’ LOGO! 8 BM programmable logic controllers, widely used in industrial and building automation. We’ll share the story behind the discovery, from reversing embedded TCP/UDP handlers to uncovering memory corruption and unauthenticated configuration manipulation. The session highlights our methodology, and lessons learned in securing small-scale industrial systems that often sit unprotected at the edge of networks.
Social
The Ruxmon attendees go to The Last Jar (616 Elizabeth St, Melbourne VIC 3000) to socialise after the talks. See you there.
Streaming
If you can't attend the event in person the talks will be streamed in the "ruxmon-stream" voice channel in the Ruxcon Discord in the day of the event! (join now by clicking here: https://discord.gg/g2CpEbkXmM
