John The Ripper cracks Siemens PLC passwords

By
Follow google news

Tool gets a facelift.

Functionality has been added to the John the Ripper password cracking tool that allows security testers to target password hashes in the Siemens S7 protocol.

John The Ripper cracks Siemens PLC passwords

The protocol allowed password-protected communication between SCADA, engineering stations and human machine interfaces and Programmable Logic Controllers (PLCs).

The plugin functionality builds on a tool created by Positive Technologies researcher Sergey Gordeychik that could collect credentials from PLCs by launching brute-force attacks against challenge-response data from TCP/IP traffic.

That functionality was improved with its integration with John the Ripper, one of the most popular password cracking tools.

A researcher at Digital Bond posted steps to get the plugin running.

Got a news tip for our journalists? Share it with us anonymously here.

Copyright © SC Magazine, Australia

Tags:

Most Read Articles

Telstra used ConnectID impermissibly for months

Telstra used ConnectID impermissibly for months

University of Sydney "online IT code library" breached

University of Sydney "online IT code library" breached

US bars approvals of new models of DJI, all other foreign drones

US bars approvals of new models of DJI, all other foreign drones

Greater Western Water's billing system data issues laid bare

Greater Western Water's billing system data issues laid bare

Log In

  |  Forgot your password?