top of page
4 min read
Network Forensics, Part 2: Detecting and Analyzing a SCADA DoS Attack
Welcome back, my aspiring network forensic investigators! Now that you have a basic understanding of Wireshark and have conducted an...
5,311 views
5 min read
SCADA Hacking: DoSing a SCADA site
SCADA and Industrial Control Sites (ICS) are among the most crucial and most vulnerable sites. These sites include everything from...
7,518 views
5 min read
SCADA Hacking: Exploiting SCADA/ICS Systems with the Command Line Tool, modbus-cli
For those of you who have been following my series on SCADA hacking, you are aware that SCADA/ICS systems do NOT use the usual protocols...
14,584 views
1 min read
SCADA Hacking: Hackers-Arise First to Reveal Vulnerability Now Recognized by Schneider Electric and
Once again, Hackers-Arise receives international recognition in SCADA Hacking! On March 28, 2017, OTW detailed here how an attacker can...
659 views
7 min read
SCADA Hacking: Ladder Logic Programming Simulation of a PLC
Nearly every SCADA/ICS system is built around programmable logic controllers or PLC's. To understand the vulnerabilities of these...
5,379 views
1 min read
Hackers-Arise Gets International Recognition for Exploiting SCADA System Vulnerability
October 25, 2016, Voice of America (VOA) News (voanews.com) ran an article about the vulnerability of SCADA/ICS systems. In that article...
1,275 views
4 min read
SCADA Hacking: SCADA/ICS Protocols (Profinet/Profibus)
One of the challenges of hacking/pentesting SCADA/ICS has been that the protocols employed by this industry are different and distinct...
9,552 views
4 min read
SCADA Hacking: SCADA Risk Assessment with CSET
In an earlier article, I laid out some of the varied methods of risk assessment in SCADA/ICS systems from academia, government and...
2,444 views
4 min read
SCADA Hacking: Hacking the Schneider Electric TM221 Modicon PLC using modbus-cli
SCADA/ICS security is probably the most important and most overlooked field of cyber security. In an era where cyber warfare is an...
10,056 views
4 min read
SCADA Hacking: SCADA/ICS Risk Assessment and Management, Part 1
Introduction One of the most crucial activities involved in securing SCADA/ICS systems is the initial Risk Assessment. Risk assessment...
4,231 views
2 min read
SCADA Hacking: SCADA Protocols (DNP3)
One the most important distinguishing characteristics of SCADA/ICS systems from that of traditional IT systems is that these systems ...
10,888 views
4 min read
SCADA Hacking: SCADA/ICS Communication Protocols (Modbus)
SCADA/ICS systems are differentiated from traditional information systems in a number of ways. Probably the most important...
14,167 views
1 min read
SCADA Hacking: Metasploit SCADA Modules
As a penetration tester/hacker, we have many resources we can use to test SCADA/ICS system security. One of the most popular is the...
10,922 views
3 min read
SCADA Hacking: Modbus Master/Slave Simulation
SCADA/ICS systems use many different protocols to communicate than your standard IT systems. The most widely used and the de facto...
13,037 views
3 min read
SCADA Hacking: Testing and Monitoring our SCADA HoneyPot
In the previous article in this series, we built a sophisticated, low-interaction SCADA honeypot with conpot. In this article, we will...
3,963 views
2 min read
SCADA Hacking: Building a SCADA Honeypot
In this tutorial, we will be setting up a SCADA/ICS Honeypot. As you know, a honeypot is a computer system that looks and acts like a...
6,962 views
1 min read
SCADA Hacking: Default Passwords for Nearly Every SCADA System
Maybe not surprisingly, many SCADA systems still are authenticated with their default passwords from the manufacturer. SCADA security...
14,090 views
3 min read
SCADA Hacking: Monitoring SCADA Sites with Splunk
SCADA sites are among the most vulnerable sites on the planet. These sites include industrial control systems, water treatment...
8,732 views
4 min read
SCADA Hacking: Finding and Enumerating SCADA sites with nmap and nmap scripts
Welcome back, my hacker novitiates! With this lab, we will conduct recon on a SCADA target using port scanning and nmap scripts. Up until...
13,763 views
5 min read
SCADA Hacking: Finding SCADA Systems using Shodan
Welcome back, my aspiring cyber warriors! Previously, I wrote a tutorial on using Shodan--the world's most dangerous search engine--to...
39,347 views
bottom of page