久久久精品中文字幕-久久久久99精品成人片三人毛片-久久久久成人精品免费播放动漫-久久久久成人精品一区二区-久久久久国产

information

新聞動態

Contact Us

聯系方式
Shenzhen City Jia Hong Wei Technology Co., Ltd.
Tel: 0755-28916839 13640994287
Contact: Mr. Shaw
303, floor 3, No. 296, Xinsheng Road, Longgang street, Longgang District, Shenzhen
Jia Hong Wei company Sina blog
Jia Hong Wei micro signal: szjahw
Jia Hong Wei mailbox: szhyjd@163.com
QQ Hao Hong Wei: 290879330

Knowledge

You are here:Home >> information >> Knowledge
PLC encryption technology and decryption method
Publish:Shenzhen City Jia Hong Wei Technology Co., Ltd.  Time:2021-10-05

PLC encryption technology and decryption method
PLC encryption technology is actually an idea of developers. As long as you understand the author‘s encryption idea, you can decrypt it quickly. In fact, in nature, whether PLC or elevator motherboard, as long as there is encryption, there will be a secret to crack it. Ha ha, the two are always a combination of spear and shield. All right, stop talking nonsense and get to the point.

First, two PLC decryption methods are introduced: 1. Direct reading method. 2. Brute force cracking.

The direct reading method takes Mitsubishi FX2 as an example: first open the serial port monitoring software (there are many online Baidu. Here I use the serial port parallel port monitoring software in the forum PLC version) to monitor the import and export data of the serial port. Then let fxwin (PLC programming software) run online with PLC. After selecting the model, click the program to read. At this time, in the serial port monitoring software, you can see that several strings of characters have been sent between the computer and PLC. The last line sent by PLC to the computer is the password, but it is ASII code. Compare the table and translate it into characters to get the password. Oh, this is the vulnerability of Mitsubishi PLC. Its programming software reads the password into the computer memory first, compares it with the password entered by the user, and the password pair can read the program. I tried it. I sent the penultimate line of characters to PLC with serial port software, and PLC also returned the password. Speaking of this, do you know what the decryption software does? The whole decryption software only needs to send a string of characters to PLC, and then translate the characters with password returned by PLC into password. Some PLCs don‘t have such loopholes, such as Omron and Fuji Nb2. They transfer the password entered by the user to the PLC, and the PLC determines whether the password is correct before determining whether the program can be read.

To deal with them, use the second method, brute force cracking: similarly, run the serial port monitoring software, open the programming software online, click the program to read, and then enter the password 1234. If you read the program, you don‘t have to solve it. If the password error is displayed, look at the data in the monitoring software. Find the string 1234. After the character containing 1234, there will be a line of information returned by PLC indicating the password error, and record this line of error information. Then open VB and do a small project: let the computer send that line of string containing 1234 to the serial port. Of course, there should be a circular statement, that is, change 1234 from 0000 to ffff, and let the computer keep trying. Use the if statement to compare the returned information with the error information just recorded. If the information is different, stop trying. The password you try is the password of PLC.

Seeing this, do you already feel that PLC encryption technology is just so. The feeling of the sea and the sky. Congratulations, it means that you have understood the truth of encryption and decryption. There are many specific implementation methods. But understanding the truth is the most important and difficult. As the saying goes: the main road has no art, from medium to tangible, and the small road is clever. Hehe, let‘s talk about this first. Some details can‘t be introduced too clearly for a while and a half. You can do it yourself, try more, use your brain more, understand more, and you will gain. If you have any questions, you can leave me a message on the forum!

Remember, we master encryption and decryption technology only for better learning, and do not use it for other illegal purposes. Let me remind you here so as not to harm people‘s children.

Previous:Encoder maintenance data backup  2023/02/19
Next:  2016/12/15
Home | CNC maintenance | Servo repair | motor repair | PLC Vision | Touch repair | PLC/HMI | Successful case | information | About jahw
主站蜘蛛池模板: 免费看三级毛片| 高清性色生活片免费视频软件| 欧美夜恋影院夜恋秀场| 日本不卡中文字幕一区二区| 亚洲国产精品久久| 91蝌蚪在线播放| 欧美1区二区三区公司| 久久久久久久久综合影视网| 欧美5g影院天天5g天天看| 高清国产视频| 在线免费看片| 亚洲综合二区| 成人午夜影院| 欧美一级看片a免费观看| 久久免费成人| 久久久午夜影院| 国产理论最新国产精品视频| 加勒比一道本综合| 亚洲国产精品综合久久网络| 99久久网| 免费不卡视频| aaa级精品久久久国产片| 国产区网址| 欧美蜜臀| 一级做a| 精品欧美日韩一区二区| 国产成人a大片大片在线播放| 日韩一区二区不卡中文字幕| 日本欧洲95视频| 在线 | 一区二区三区| 欧美yw193.c㎝在线观看 | 色牛网| 高清亚洲精品酒店一区| 在线观看亚洲精品国产| 亚洲欧美另类色图| 福利一区二区三区视频在线观看| 邪恶工番口番大全全彩色| 中文字幕亚洲综合久久202| 不卡中文一二三区| 免费一看一级毛片人| 1000部国产成人免费视频|