John The Ripper cracks Siemens PLC passwords

By on
John The Ripper cracks Siemens PLC passwords

Tool gets a facelift.

Functionality has been added to the John the Ripper password cracking tool that allows security testers to target password hashes in the Siemens S7 protocol.

The protocol allowed password-protected communication between SCADA, engineering stations and human machine interfaces and Programmable Logic Controllers (PLCs).

The plugin functionality builds on a tool created by Positive Technologies researcher Sergey Gordeychik that could collect credentials from PLCs by launching brute-force attacks against challenge-response data from TCP/IP traffic.

That functionality was improved with its integration with John the Ripper, one of the most popular password cracking tools.

A researcher at Digital Bond posted steps to get the plugin running.

Got a news tip for our journalists? Share it with us anonymously here.

Copyright © SC Magazine, Australia


Most Read Articles

Log In

  |  Forgot your password?