In industrial environments segmentation between IT and OT systems is paramount. It is no longer enough to perform network segmentation alone; instead, domain, application, and platform segmentation is equally as important. Attackers are exploiting domain trusts, credential re-use, and shared management applications which creates attack chains with non-traditional exploitation.
'
In this webinar, we will be enumerating and exploiting the IT/OT boundary by focusing on 'it's a feature, not a bug '. In our Offensive Security lab, Honeywell will demonstrate an attack chain which includes the following:
Join us on Dec 13 1pm EST to follow an attack chain where we exploit the users of the fictitious m2generation.com while using non-traditional tactics and techniques.