Re: SCADA/Municipal water system attacks

2011-11-27 Thread Thomas Cameron
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Erm, really? How so. On 11/21/2011 09:08 PM, Lisa Kachold wrote: Cute comic! But sadly technically incorrect. On Nov 21, 2011 8:03 PM, Alex Dean a...@crackpot.org mailto:a...@crackpot.org wrote: On Nov 21, 2011, at 7:28 PM, Lisa

Re: SCADA/Municipal water system attacks

2011-11-21 Thread Derek Trotter
I figure that to be 830,584 possible combinations. That's 26 lower case letters, 26 more upper case, 10 numbers and the special characters I counted on my keyboard. That's 94 possible characters for each of the three in the password. 94*94*94=830,584. Of course there are the other possible

Re: SCADA/Municipal water system attacks

2011-11-21 Thread Lisa Kachold
Quite correct. It would be cracked quite key. But not as fast as a real word, or modified word using say 0 for o and maybe@ for a. On Nov 21, 2011 9:23 AM, Derek Trotter expat.arizo...@gmail.com wrote: I figure that to be 830,584 possible combinations. That's 26 lower case letters, 26 more

Re: SCADA/Municipal water system attacks

2011-11-21 Thread Alex Dean
On Nov 21, 2011, at 7:28 PM, Lisa Kachold wrote: Quite correct. It would be cracked quite key. But not as fast as a real word, or modified word using say 0 for o and maybe@ for a. http://xkcd.com/936/ --- PLUG-discuss mailing list -

Re: SCADA/Municipal water system attacks

2011-11-21 Thread Lisa Kachold
Cute comic! But sadly technically incorrect. On Nov 21, 2011 8:03 PM, Alex Dean a...@crackpot.org wrote: On Nov 21, 2011, at 7:28 PM, Lisa Kachold wrote: Quite correct. It would be cracked quite key. But not as fast as a real word, or modified word using say 0 for o and maybe@ for a.

Re: SCADA/Municipal water system attacks

2011-11-20 Thread Lisa Kachold
On Sat, Nov 19, 2011 at 11:25 PM, Michael Butash mich...@butash.net wrote: There was some idle chat here prior about Stuxnet and how it almost single-handed stopped or at least delayed Iran's Nuclear aspirations, and I'd commented on how there was a variant called Duqu that was running

Re: SCADA/Municipal water system attacks

2011-11-20 Thread Derek Trotter
Same here. When I first heard of this, I said to myself: Bet these systems run on windows. On 11/20/2011 14:00, Lisa Kachold wrote: On Sat, Nov 19, 2011 at 11:25 PM, Michael Butash mich...@butash.net mailto:mich...@butash.net wrote: There was some idle chat here prior about Stuxnet

Re: SCADA/Municipal water system attacks

2011-11-20 Thread Sam Kreimeyer
I think that most operators generally take whatever data SCADA spits out at face value. After all, how would they recognize what dangerous behavior looks like if they don't understand how these systems work anyway? Let the IT guy figure it out. I think we are witnessing the nascence of an

Re: SCADA/Municipal water system attacks

2011-11-20 Thread Michael Butash
Hah. Hacker Says Texas Town Used Three Character Password To Secure Internet Facing SCADA System http://threatpost.com/en_us/blogs/hacker-says-texas-town-used-three-character-password-secure-internet-facing-scada-system-11201 Good enough for government. -mb On 11/20/2011 03:27 PM, Sam

SCADA/Municipal water system attacks

2011-11-19 Thread Michael Butash
There was some idle chat here prior about Stuxnet and how it almost single-handed stopped or at least delayed Iran's Nuclear aspirations, and I'd commented on how there was a variant called Duqu that was running rampant in our SCADA systems that run municipal water. Seems our environmentals