+ All Categories
Home > Technology > Introduction to ICS/SCADA security

Introduction to ICS/SCADA security

Date post: 14-Apr-2017
Category:
Upload: cysinfo-cyber-security-community
View: 259 times
Download: 3 times
Share this document with a friend
10
ICS / SCADA Cyber security Adithya Naresh SAP Labs
Transcript
Page 1: Introduction to ICS/SCADA security

ICS / SCADA Cyber security

Adithya NareshSAP Labs

Page 2: Introduction to ICS/SCADA security

root@kali :-# whoami

• Security Enthusiast

• Been in ICS for 2 years in my previous employment

• Like to play around with windows executable

Page 3: Introduction to ICS/SCADA security

root@kali :-# ls -al ICS

Page 4: Introduction to ICS/SCADA security

root@kali :-# cat ICS

Page 5: Introduction to ICS/SCADA security

root@kali :-# sed -n ‘/vendors/p’ ICS

Page 6: Introduction to ICS/SCADA security
Page 7: Introduction to ICS/SCADA security

Sensors and actuators allow interaction with the physical world (pressure sensor, valves,

motors….)

Local HMI Human-Machine Interface, permits the supervision and control of a sub

process

PLC Programmable Logic Controller : manages the sensors and actuators

Supervision screen remote supervision of the industrial process

Data historian Records all the data from the production and Scada networks

RTU Remote Terminal Unit (standalone PLC)

Page 8: Introduction to ICS/SCADA security
Page 9: Introduction to ICS/SCADA security

run exploit

root@kali :-# echo “Demo Time”

Page 10: Introduction to ICS/SCADA security

root@kali :-# exit ICS

• https://ics-cert-training.inl.gov/ - ICS CERT VLP

• http://www.controlglobal.com/ - Top 50

• https://ics-radar.shodan.io - Shodan

• https://www.defcon.org - Defcon


Recommended