John The Ripper cracks Siemens PLC passwords

By
Follow google news

Tool gets a facelift.

Functionality has been added to the John the Ripper password cracking tool that allows security testers to target password hashes in the Siemens S7 protocol.

John The Ripper cracks Siemens PLC passwords

The protocol allowed password-protected communication between SCADA, engineering stations and human machine interfaces and Programmable Logic Controllers (PLCs).

The plugin functionality builds on a tool created by Positive Technologies researcher Sergey Gordeychik that could collect credentials from PLCs by launching brute-force attacks against challenge-response data from TCP/IP traffic.

That functionality was improved with its integration with John the Ripper, one of the most popular password cracking tools.

A researcher at Digital Bond posted steps to get the plugin running.

Add iTnews as your trusted source

Got a news tip for our journalists? Share it with us anonymously here.

Copyright © SC Magazine, Australia

Tags:

Most Read Articles

Services Australia describes fraud, debt-related machine learning use cases

Services Australia describes fraud, debt-related machine learning use cases

Medibank reveals attack vector and cost of 2022 security breach

Medibank reveals attack vector and cost of 2022 security breach

USB stick opens Windows BitLocker drives in new zero-day

USB stick opens Windows BitLocker drives in new zero-day

'ClickFix' attack tricks users into hacking themselves, ACSC warns

'ClickFix' attack tricks users into hacking themselves, ACSC warns

Log In

  |  Forgot your password?