About Session
Technical Level: Advanced
Requirement: Bring a laptop
This presentation deeps dive into the realm of reverse engineering applied to proprietary protocols within Operational Technology (OT) environments. Focusing on uncovering data concealed within hidden fields, our research explores the methodologies and tools employed to extract data from OT protocols. Through systematic analysis and experimentation, we demonstrate the effectiveness of reverse engineering techniques in unveiling the hidden facets of OT proprietary protocols.