久久久精品中文字幕-久久久久99精品成人片三人毛片-久久久久成人精品免费播放动漫-久久久久成人精品一区二区-久久久久国产

information

新聞動態

Contact Us

聯系方式
Shenzhen City Jia Hong Wei Technology Co., Ltd.
Tel: 0755-28916839 13640994287
Contact: Mr. Shaw
303, floor 3, No. 296, Xinsheng Road, Longgang street, Longgang District, Shenzhen
Jia Hong Wei company Sina blog
Jia Hong Wei micro signal: szjahw
Jia Hong Wei mailbox: szhyjd@163.com
QQ Hao Hong Wei: 290879330

Knowledge

You are here:Home >> information >> Knowledge
PLC encryption technology and decryption method
Publish:Shenzhen City Jia Hong Wei Technology Co., Ltd.  Time:2021-10-05

PLC encryption technology and decryption method
PLC encryption technology is actually an idea of developers. As long as you understand the author‘s encryption idea, you can decrypt it quickly. In fact, in nature, whether PLC or elevator motherboard, as long as there is encryption, there will be a secret to crack it. Ha ha, the two are always a combination of spear and shield. All right, stop talking nonsense and get to the point.

First, two PLC decryption methods are introduced: 1. Direct reading method. 2. Brute force cracking.

The direct reading method takes Mitsubishi FX2 as an example: first open the serial port monitoring software (there are many online Baidu. Here I use the serial port parallel port monitoring software in the forum PLC version) to monitor the import and export data of the serial port. Then let fxwin (PLC programming software) run online with PLC. After selecting the model, click the program to read. At this time, in the serial port monitoring software, you can see that several strings of characters have been sent between the computer and PLC. The last line sent by PLC to the computer is the password, but it is ASII code. Compare the table and translate it into characters to get the password. Oh, this is the vulnerability of Mitsubishi PLC. Its programming software reads the password into the computer memory first, compares it with the password entered by the user, and the password pair can read the program. I tried it. I sent the penultimate line of characters to PLC with serial port software, and PLC also returned the password. Speaking of this, do you know what the decryption software does? The whole decryption software only needs to send a string of characters to PLC, and then translate the characters with password returned by PLC into password. Some PLCs don‘t have such loopholes, such as Omron and Fuji Nb2. They transfer the password entered by the user to the PLC, and the PLC determines whether the password is correct before determining whether the program can be read.

To deal with them, use the second method, brute force cracking: similarly, run the serial port monitoring software, open the programming software online, click the program to read, and then enter the password 1234. If you read the program, you don‘t have to solve it. If the password error is displayed, look at the data in the monitoring software. Find the string 1234. After the character containing 1234, there will be a line of information returned by PLC indicating the password error, and record this line of error information. Then open VB and do a small project: let the computer send that line of string containing 1234 to the serial port. Of course, there should be a circular statement, that is, change 1234 from 0000 to ffff, and let the computer keep trying. Use the if statement to compare the returned information with the error information just recorded. If the information is different, stop trying. The password you try is the password of PLC.

Seeing this, do you already feel that PLC encryption technology is just so. The feeling of the sea and the sky. Congratulations, it means that you have understood the truth of encryption and decryption. There are many specific implementation methods. But understanding the truth is the most important and difficult. As the saying goes: the main road has no art, from medium to tangible, and the small road is clever. Hehe, let‘s talk about this first. Some details can‘t be introduced too clearly for a while and a half. You can do it yourself, try more, use your brain more, understand more, and you will gain. If you have any questions, you can leave me a message on the forum!

Remember, we master encryption and decryption technology only for better learning, and do not use it for other illegal purposes. Let me remind you here so as not to harm people‘s children.

Previous:Encoder maintenance data backup  2023/02/19
Next:  2016/12/15
Home | CNC maintenance | Servo repair | motor repair | PLC Vision | Touch repair | PLC/HMI | Successful case | information | About jahw
主站蜘蛛池模板: 嫩草视频网站| 久久精品91| 国产1区精品| 黑人日b| 国产一二三区在线观看| 久久久精品久久久久久久久久久| 久久99精品久久久久久欧洲站| 黄色大全免费看| 人人香蕉| 日本高清aⅴ毛片免费| 免费一级a毛片免费观看欧美大片 免费一级a毛片夜夜看 | 久久一区二区精品| 四库影库免费永久在线| 农村黄a三级三级三级| 草草视频免费观看| 大桥未久日韩欧美亚洲国产| 亚洲视频在线不卡| pans全部视频在线观看| 亚洲精品自产拍在线观看| 欧美一级毛片日韩一级| 国产日本在线| 337q日本大胆欧美人术艺术| 青草精品视频| www国产精品com| 亚洲国产精品综合久久久| 国产成人精品一区二区| 999国产精品视频| 欧美sese| 亚洲一区二区影院| 久伊人网| 亚洲欧洲一区二区三区在线| 成年大片免费视频播放手机不卡 | 香蕉视频呦呦| 九九免费高清在线观看视频| 日本aa在线| 成人交性视频免费看| 国产视频毛片| 精品国产一区二区三区久久影院| 亚洲欧美自拍另类图片色| 日本做爰免费大片视频| 免费一级毛片在线播放欧美 |