RT @attritionorg: RT @spacerog: 20 mins into this SCADA talk and no actual info imparted, walking out < majority of scada talks like that +1
@Wh1t3Rabbit That is our point. I only attended ones that suggested/promise new vulns. Always left without that information.
-
-
@attritionorg Even ones that disclosed "new" vulns. It's just lack of encryption, auth bypass, info disclosure on a ICS or embedded. Right? -
@Wh1t3Rabbit few even go that far. or the last I saw was "elite vulns!" but all of their PoCs were with physical access to PLC cards -
@attritionorg Hey I can at least give credit to those who can, given physical access, r/e pieces of it an exploit remotely. -
@Wh1t3Rabbit physical access isn't remote though. and "hypothetically but we couldn't reproduce or verify it happened" != real world vuln -
@attritionorg@Wh1t3Rabbit meh. You guys just don't have enough faith in$Vendor releasing iOS Scada control console
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.