What happens if an attacker gains access to a Human-Machine Interface (HMI)?Can attackers cause widespread disruption simply by changing process variables? The answer isn’t as straightforward as one might think.Jan 11Jan 11
How Attackers Target OT: From Process Understanding to SCIL ScriptsDisclaimer: The opinions stated here are my own, not the views of my employer.Feb 5, 2024Feb 5, 2024
Understanding and Abusing Access Tokens — Part IINow, considering the knowledge gained earlier in Part I, let’s understand SeImpersonatePrivilege which the administrator account has by…May 31, 20201May 31, 20201