Five years of hacking ICS/IoT in Pwn2Own

Sharon Brizinov | Day 2, 4:35pm - 5:20pm

Abstract

In the past five years we've researched & hacked ICS/IoT products in five different Pwn2Own events. In these specialized versions of the Pwn2Own hacking competition we had to find 0-days and exploit them live on stage. This included anything from HMI software to Engineering Workstations and even ICS protocols like OPC-UA.

In this talk, we will share the bugs and exploits we found, but also the insights and lessons we gained from preparing for these events. We'll discuss how these experiences improved our approach to ICS security and helped shape the future of the field, highlighting the importance of continuous learning and adaptation in building a more secure industrial environment.

The Speaker(s)

Sharon Brizinov

Sharon Brizinov

Sharon Brizinov is a renowned expert in IoT and OT vulnerability research currently leading Claroty's research group – Team82. With over 200 CVEs to his name he has shared his insights at prestigious conferences such as DEFCON, BlackHat, SANS, and more. Sharon has competed in Pwn2Own five times, earning the title of Master of Pwn, and has been honored with the SANS Institute Researcher of the Year Award and a DEFCON Black Badge.