“Using examples from our findings along with working PoC exploit code and a scanner capable of identifying Industrial Control Systems that we are releasing, we will teach you how to research and find ICS software vulnerabilities yourself.”
an appendix to pearlofcivilization.net
“Using examples from our findings along with working PoC exploit code and a scanner capable of identifying Industrial Control Systems that we are releasing, we will teach you how to research and find ICS software vulnerabilities yourself.”