Controlling the physical world with BacNET attack framework
Posted on 11 April 2013.
The integration of computer technology to monitor the inner works of large office buildings, factories and plants has been evolving for years. These types of systems are often referred to as Building Automation or Building Management Systems (BMS).

Companies uses these systems to monitor a myriad of sensors, gauges and alarms that provide statistics about equipment usage as well as inform technicians when a system is not functioning correctly. What use to be simple alerting has morphed into highly complex network enabled systems that provide complete operational control over such things as HVAC, elevators, electrical & water supply and even door locks and safety systems.

This talk from Shmoocon 2013 takes a closer look at how these systems work as well as an attacker’s view into the BacNET protocols.

The author introduces a new collection of tools that pentesters and system admins could use to help identify BacNET enabled systems as well as test their solvency against attack, spoofing and denial of service.

Author: Brad Bowers is Security Operations Manager for a large financial institution with over 10 years of experience in security engineering, system forensics and incident response. Brad is a frequent writer and presenter on topics of emerging threats and threat intelligence. For the last couple years Brad has been working on projects focusing on hardware and RF security.


Intentional backdoors in iOS devices uncovered

Posted on 22 July 2014.  |  A researcher has revealed that Apple has equipped its mobile iOS with several undocumented features that can be used by attackers and law enforcement to access the sensitive data contained on the devices running it.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.


Tue, Jul 22nd