In this blog, we explore how the students demonstrated how attackers could exploit the vulnerability to cause systems to crash and how the lack of proper input validation could be leveraged to disrupt PLC operations.
In this blog, we explore how the students demonstrated how attackers could exploit the vulnerability to cause systems to crash and how the lack of proper input validation could be leveraged to disrupt PLC operations.