SCADA Hacking: Anatomy of a SCADA Malware, BlackEnergy 3 Attack on the Ukraine Grid

Welcome back to this series on SCADA Hacking and Security! SCADA/ICS security is critical for SO many reasons. Among the most important is that any cyber warfare in the future will likely involve some form of SCADA/ICS hacking to take down the opponent’s critical infrastructure such as electricity, water, oil refining and transportation. As we […]

Continue Reading

Basics of XORing

In a recent tutorial, I showed you how to use shikata_ga_nai to change the signature of a payload to evade detection by security devices (firewalls, IDS, etc.) and AV software. Shikata_ga_nai is an encoding module in Metasploit that XORs the payload through multiple iterations (the number of iterations is up to you), thereby changing the […]

Continue Reading