久久久精品中文字幕-久久久久99精品成人片三人毛片-久久久久成人精品免费播放动漫-久久久久成人精品一区二区-久久久久国产

information

新聞動態

Contact Us

聯系方式
Shenzhen City Jia Hong Wei Technology Co., Ltd.
Tel: 0755-28916839 13640994287
Contact: Mr. Shaw
303, floor 3, No. 296, Xinsheng Road, Longgang street, Longgang District, Shenzhen
Jia Hong Wei company Sina blog
Jia Hong Wei micro signal: szjahw
Jia Hong Wei mailbox: szhyjd@163.com
QQ Hao Hong Wei: 290879330

Knowledge

You are here:Home >> information >> Knowledge
PLC encryption technology and decryption method
Publish:Shenzhen City Jia Hong Wei Technology Co., Ltd.  Time:2021-10-05

PLC encryption technology and decryption method
PLC encryption technology is actually an idea of developers. As long as you understand the author‘s encryption idea, you can decrypt it quickly. In fact, in nature, whether PLC or elevator motherboard, as long as there is encryption, there will be a secret to crack it. Ha ha, the two are always a combination of spear and shield. All right, stop talking nonsense and get to the point.

First, two PLC decryption methods are introduced: 1. Direct reading method. 2. Brute force cracking.

The direct reading method takes Mitsubishi FX2 as an example: first open the serial port monitoring software (there are many online Baidu. Here I use the serial port parallel port monitoring software in the forum PLC version) to monitor the import and export data of the serial port. Then let fxwin (PLC programming software) run online with PLC. After selecting the model, click the program to read. At this time, in the serial port monitoring software, you can see that several strings of characters have been sent between the computer and PLC. The last line sent by PLC to the computer is the password, but it is ASII code. Compare the table and translate it into characters to get the password. Oh, this is the vulnerability of Mitsubishi PLC. Its programming software reads the password into the computer memory first, compares it with the password entered by the user, and the password pair can read the program. I tried it. I sent the penultimate line of characters to PLC with serial port software, and PLC also returned the password. Speaking of this, do you know what the decryption software does? The whole decryption software only needs to send a string of characters to PLC, and then translate the characters with password returned by PLC into password. Some PLCs don‘t have such loopholes, such as Omron and Fuji Nb2. They transfer the password entered by the user to the PLC, and the PLC determines whether the password is correct before determining whether the program can be read.

To deal with them, use the second method, brute force cracking: similarly, run the serial port monitoring software, open the programming software online, click the program to read, and then enter the password 1234. If you read the program, you don‘t have to solve it. If the password error is displayed, look at the data in the monitoring software. Find the string 1234. After the character containing 1234, there will be a line of information returned by PLC indicating the password error, and record this line of error information. Then open VB and do a small project: let the computer send that line of string containing 1234 to the serial port. Of course, there should be a circular statement, that is, change 1234 from 0000 to ffff, and let the computer keep trying. Use the if statement to compare the returned information with the error information just recorded. If the information is different, stop trying. The password you try is the password of PLC.

Seeing this, do you already feel that PLC encryption technology is just so. The feeling of the sea and the sky. Congratulations, it means that you have understood the truth of encryption and decryption. There are many specific implementation methods. But understanding the truth is the most important and difficult. As the saying goes: the main road has no art, from medium to tangible, and the small road is clever. Hehe, let‘s talk about this first. Some details can‘t be introduced too clearly for a while and a half. You can do it yourself, try more, use your brain more, understand more, and you will gain. If you have any questions, you can leave me a message on the forum!

Remember, we master encryption and decryption technology only for better learning, and do not use it for other illegal purposes. Let me remind you here so as not to harm people‘s children.

Previous:Encoder maintenance data backup  2023/02/19
Next:  2016/12/15
Home | CNC maintenance | Servo repair | motor repair | PLC Vision | Touch repair | PLC/HMI | Successful case | information | About jahw
主站蜘蛛池模板: 国产成人久久精品区一区二区 | 黑人巨大进入美女深处的视频 | 免费看av的网址 | 久久精品国产一区二区三区 | 国产亚洲精品网站 | 大插香蕉 | 男女啪啪免费体验区 | 国产精品jvid在线观看 | 2018高清国产一道国产 | 国产精品98福利小视频 | 色婷婷六月桃花综合影院 | 久久99热在线观看7 久久99热只有视精品6国产 | 中文字幕 日韩在线 | 国产在线xvideos | 成人在线一区二区 | 日本高清免费不卡毛片 | 久久视频在线播放视频99re6 | 美国一级做a爰片性色毛片 美国人与性xxxxxxx | 久久久久久久久综合影视网 | 日韩欧美毛片免费看播放 | 成人免费一区二区三区在线观看 | 国产在线日韩 | 亚洲图片一区二区三区 | 香蕉精品在线 | 91在线区啪国自产网页 | 在线欧美视频免费观看国产 | 站长工具亚洲 | 香蕉超级碰碰碰97视频在线观看 | 国产一区二区三区在线观看视频 | 日本大片久久久高清免费看 | 国产成人综合高清在线观看 | 91精品国产免费久久久久久青草 | 亚洲无线一二三四区手机 | 成人乱码一区二区三区四区 | 一级毛片在线直接观看 | 啪啪日韩 | 成人黄色片在线观看 | 亚洲天天综合网 | 亚洲伦理一区二区三区 | 欧美操美女| 国产精品午夜在线观看 |