久久久精品中文字幕-久久久久99精品成人片三人毛片-久久久久成人精品免费播放动漫-久久久久成人精品一区二区-久久久久国产

information

新聞動態(tài)

Contact Us

聯(lián)系方式
Shenzhen City Jia Hong Wei Technology Co., Ltd.
Tel: 0755-28916839 13640994287
Contact: Mr. Shaw
303, floor 3, No. 296, Xinsheng Road, Longgang street, Longgang District, Shenzhen
Jia Hong Wei company Sina blog
Jia Hong Wei micro signal: szjahw
Jia Hong Wei mailbox: szhyjd@163.com
QQ Hao Hong Wei: 290879330

Knowledge

You are here:Home >> information >> Knowledge
PLC encryption technology and decryption method
Publish:Shenzhen City Jia Hong Wei Technology Co., Ltd.  Time:2021-10-05

PLC encryption technology and decryption method
PLC encryption technology is actually an idea of developers. As long as you understand the author‘s encryption idea, you can decrypt it quickly. In fact, in nature, whether PLC or elevator motherboard, as long as there is encryption, there will be a secret to crack it. Ha ha, the two are always a combination of spear and shield. All right, stop talking nonsense and get to the point.

First, two PLC decryption methods are introduced: 1. Direct reading method. 2. Brute force cracking.

The direct reading method takes Mitsubishi FX2 as an example: first open the serial port monitoring software (there are many online Baidu. Here I use the serial port parallel port monitoring software in the forum PLC version) to monitor the import and export data of the serial port. Then let fxwin (PLC programming software) run online with PLC. After selecting the model, click the program to read. At this time, in the serial port monitoring software, you can see that several strings of characters have been sent between the computer and PLC. The last line sent by PLC to the computer is the password, but it is ASII code. Compare the table and translate it into characters to get the password. Oh, this is the vulnerability of Mitsubishi PLC. Its programming software reads the password into the computer memory first, compares it with the password entered by the user, and the password pair can read the program. I tried it. I sent the penultimate line of characters to PLC with serial port software, and PLC also returned the password. Speaking of this, do you know what the decryption software does? The whole decryption software only needs to send a string of characters to PLC, and then translate the characters with password returned by PLC into password. Some PLCs don‘t have such loopholes, such as Omron and Fuji Nb2. They transfer the password entered by the user to the PLC, and the PLC determines whether the password is correct before determining whether the program can be read.

To deal with them, use the second method, brute force cracking: similarly, run the serial port monitoring software, open the programming software online, click the program to read, and then enter the password 1234. If you read the program, you don‘t have to solve it. If the password error is displayed, look at the data in the monitoring software. Find the string 1234. After the character containing 1234, there will be a line of information returned by PLC indicating the password error, and record this line of error information. Then open VB and do a small project: let the computer send that line of string containing 1234 to the serial port. Of course, there should be a circular statement, that is, change 1234 from 0000 to ffff, and let the computer keep trying. Use the if statement to compare the returned information with the error information just recorded. If the information is different, stop trying. The password you try is the password of PLC.

Seeing this, do you already feel that PLC encryption technology is just so. The feeling of the sea and the sky. Congratulations, it means that you have understood the truth of encryption and decryption. There are many specific implementation methods. But understanding the truth is the most important and difficult. As the saying goes: the main road has no art, from medium to tangible, and the small road is clever. Hehe, let‘s talk about this first. Some details can‘t be introduced too clearly for a while and a half. You can do it yourself, try more, use your brain more, understand more, and you will gain. If you have any questions, you can leave me a message on the forum!

Remember, we master encryption and decryption technology only for better learning, and do not use it for other illegal purposes. Let me remind you here so as not to harm people‘s children.

Previous:Encoder maintenance data backup  2023/02/19
Next:  2016/12/15
Home | CNC maintenance | Servo repair | motor repair | PLC Vision | Touch repair | PLC/HMI | Successful case | information | About jahw
主站蜘蛛池模板: 看一级毛片一区二区三区免费| 国产三级在线观看a| 国产精品乱| 日韩亚洲综合精品国产| 一级片免费网址| 日韩亚洲精品不卡在线| 成人网18免费软件大全| 欧美成人午夜做爰视频在线观看 | 一区二区三区高清视频在线观看| 亚洲欧美一区二区三区麻豆| 91精品国产综合久久欧美| 久久婷婷综合中文字幕| 亚洲国产精品久久综合| 91免费国产在线观看| 久久窝窝国产精品午夜看15| 老司机狠狠k免费毛片| 成人欧美一区二区三区在线观看| 欧美成人aaa大片| 国产老妇一性一交一乱| wwwwxxx日本| 色播亚洲| 亚洲人精品| 182tv成人午夜在线观看| 一级做a爰性视频| 久久亚洲黄色| 日本大片在线观看免费视频| 老人与老人一级毛片| 西西人体午夜视频| 成人欧美精品一区二区不卡| 免费看黄色一级| 欧美不卡二区| 欧美草逼网| 欧美黄色网页| 欧美激情一区二区三区不卡 | 男女性高爱潮免费的国产| 欧洲美女高清一级毛片| 国产一级特黄高清免费大片| 国产成人www免费人成看片| 国产美女操| 国产成人精品综合网站| 国产免费私拍一区二区三区|