John The Ripper cracks Siemens PLC passwords

By

Tool gets a facelift.

Functionality has been added to the John the Ripper password cracking tool that allows security testers to target password hashes in the Siemens S7 protocol.

John The Ripper cracks Siemens PLC passwords

The protocol allowed password-protected communication between SCADA, engineering stations and human machine interfaces and Programmable Logic Controllers (PLCs).

The plugin functionality builds on a tool created by Positive Technologies researcher Sergey Gordeychik that could collect credentials from PLCs by launching brute-force attacks against challenge-response data from TCP/IP traffic.

That functionality was improved with its integration with John the Ripper, one of the most popular password cracking tools.

A researcher at Digital Bond posted steps to get the plugin running.

Got a news tip for our journalists? Share it with us anonymously here.

Copyright © SC Magazine, Australia

Tags:

Most Read Articles

Travel eSIMs secretly route traffic over Chinese and undisclosed networks: study

Travel eSIMs secretly route traffic over Chinese and undisclosed networks: study

Greater Western Water's billing system data issues laid bare

Greater Western Water's billing system data issues laid bare

Attackers weaponise Linux file names as malware vectors

Attackers weaponise Linux file names as malware vectors

Microsoft plans full quantum-resistant cryptography transition by 2033

Microsoft plans full quantum-resistant cryptography transition by 2033

Log In

  |  Forgot your password?