Skip to main content

Stuxnet - The First Digital Weapon


                    Stuxnet is a file type worm which exploits zero-day vulnerabilities to attack computers. This is considered as the very first digital weapon that not only harms to computers but also the physical aspects which run by computer commands. It especially targets on centrifuges which produce enrich uranium to make nuclear weapons. It was first found as a result of US and Israel project to derail or delay Iran’s process of nuclear weapon manufacture.



How does it infect?
               The worm is spread by USB drives and it harms to the machine which runs on Microsoft Windows platform. It pretends to seem like reliable by presenting a digital certification and it cannot be identified by a malware detecting tools or security experts. Stuxnet search for the PLC (Programmable logical controller) which is the manufacture of the Siemens. PLC is used to make industrial machine controlled by interact with the computers.


What it does?
               It compromises with PLC and collects all the information regarding the functionality of the machine. And then starts to spin the machine too fast more than usual for too long. Unless the problem is discovered, PLC shows that everything runs perfectly. Consequently, the Long process of overproduction is caused to machine damage and lower quality product.


What if it does not find PLC?
               If it is not targeting a machine or cannot search for PLC, the worm does not do anything. If it can access the Internet, it will update itself to its most recent version.

Even though it was found as spread through USB it can be spread via the Internet when some modification is done in exploit code.

"Cyber War is the battle field of now" - Geoff Livingston
              

Comments

Popular posts from this blog

Exploit Windows 2000 machine using the Metaspolit framework from the Kali Linux machine.

Exploit Windows 2000 machine using the Metaspolit framework from the Kali Linux machine. When the windows 2000 the machine came for public use, many vulnerabilities were identified. This was caused by the number of vulnerabilities in IIS services. Many attacks came from remote sources through the internet and there were critical flaws due to the vulnerable encryption methods. From this article how the vulnerabilities of windows would be identified using Nessus, and exploit it using Metasploit in kali machine will be described. To do it I am using my main operating system (OS) kali and virtual machine windows 2000. For that IP range of both machines should be in the same range to ensure those are in the same network. Therefore network setting was fix as bridge adaptor in windows virtual machine. Check IP of kali using ifconfig Check IP of windows using ipconfig Then Nessus vulnerability s...

Change Language in Google Account

When we create an email address, sometimes we do not consider the language preferences. Afterward, when we log in to a google account, context will be shown as unfamiliar. So we can change the language preferences of google account by following steps.  1.  Click on the Google profile and select google account 2.  Select data & personalization settings. 3. Scroll down and go to general preferences for the web. And click language. 4. If you need to change the default language, click on the pen sign. 5. If you want to add more languages, click on add other languages.

Double Submit Cookie

Double submit cookie is one of the prevention method for Cross-Site Request Forgery ( CSRF ) . Same as the synchronizer token pattern, it is using a cryptographic random value to validate a request agent. However, the implementation is different since the way it is saved is dissimilar. Here, the generated token value is saved in the browser, not on the server. Therefore servers no need to save huge amounts of data. When a user makes a request, the server compared the token value in the form DOM element (in the body) and token in the cookie header of the request.  (Click on the images to view clearly) Source code of the implemented program can be downloaded from here . A login page, index.html has been implemented to enroll users. Once the user entered the credentials, the form data will be submitted to login_handler.php using POST method. If the username and password are correct, the user session is started and the username will be assigned to ...