Abusing CNC Technologies

Abusing CNC Technologies

Black Hat via YouTube Direct link

Program Rewriting

16 of 21

16 of 21

Program Rewriting

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Abusing CNC Technologies

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 CNC Machines
  3. 3 Industrial Revolution
  4. 4 A Complex Supply Chain
  5. 5 Research Approach
  6. 6 Example: Ethernet Q Commands
  7. 7 Identified Problems
  8. 8 Program Code Leak via MTConnect
  9. 9 Enabled Jumper allowed Firmware Extraction
  10. 10 Lack of Resource Access Control on Haas
  11. 11 A change of tool geometry...
  12. 12 causes micro-defects
  13. 13 Damaging a tool / part
  14. 14 Leaking Program Code
  15. 15 Hijacking a Parametric Program
  16. 16 Program Rewriting
  17. 17 Damaging a part
  18. 18 Theft of Manufacturing Information
  19. 19 Triggering Software Alarms
  20. 20 Responsible Disclosure
  21. 21 Countermeasures

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.