Search
SCADA & ICS
SCADA and ICS security is a growing concern. Cybersecurity training on these vital systems identifying and mitigating potential threats that could disrupt essential services or cause catastrophic damage.


SCADA Hacking: The Triton Malware Threat to SCADA/ICS Infrastructure
Welcome back, my aspiring SCADA cyber warriors! SCADA/ICS infrastructure is under continuous threat. These systems are crucial to any...
3 min read
2,807 views


SCADA Hacking: Attacking SCADA/ICS Systems through the Human Machine Interface (HMI)
Welcome back, my aspiring SCADA/ICS cyberwarriors! Let's begin by congratulating you on your foresight in committing to study SCADA/ICS...
4 min read
5,431 views


SCADA Hacking: Hacking the Schneider Automated Building System
SCADA and ICS systems control industrial processes around the world. Everything from railroads, to traffic lights, to oil refineries to...
4 min read
12,569 views


SCADA Hacking: Finding Vulnerable SCADA Systems using Google Hacking
Welcome back, my tenderfoot hackers! Google Hacking and Dorks As most of you know, Google crawls the globe and stores and indexes the...
3 min read
15,418 views


Metasploit Basics, Part 16: Metasploit SCADA Hacking
Metasploit is widely recognized as a powerful tool to conduct penetration testing and hacking on traditional IT systems, but few people...
5 min read
15,292 views


SCADA Hacking: Anatomy of Cyber War, the Stuxnet Attack
As you study SCADA/ICS hacking and security, it is useful to look back at some of the most successful SCADA/ICS attacks in history. In...
6 min read
4,525 views


Network Forensics, Part 2: Detecting and Analyzing a SCADA DoS Attack
Welcome back, my aspiring network forensic investigators! Now that you have a basic understanding of Wireshark and have conducted an...
4 min read
5,366 views


SCADA Hacking: DoSing a SCADA site
SCADA and Industrial Control Sites (ICS) are among the most crucial and most vulnerable sites. These sites include everything from...
5 min read
7,558 views


SCADA Hacking: Exploiting SCADA/ICS Systems with the Command Line Tool, modbus-cli
For those of you who have been following my series on SCADA hacking, you are aware that SCADA/ICS systems do NOT use the usual protocols...
5 min read
14,821 views


SCADA Hacking: Hackers-Arise First to Reveal Vulnerability Now Recognized by Schneider Electric and
Once again, Hackers-Arise receives international recognition in SCADA Hacking! On March 28, 2017, OTW detailed here how an attacker can...
1 min read
666 views

SCADA Hacking: Ladder Logic Programming Simulation of a PLC
Nearly every SCADA/ICS system is built around programmable logic controllers or PLC's. To understand the vulnerabilities of these...
7 min read
5,415 views


Hackers-Arise Gets International Recognition for Exploiting SCADA System Vulnerability
October 25, 2016, Voice of America (VOA) News (voanews.com) ran an article about the vulnerability of SCADA/ICS systems. In that article...
1 min read
1,287 views

SCADA Hacking: SCADA/ICS Protocols (Profinet/Profibus)
One of the challenges of hacking/pentesting SCADA/ICS has been that the protocols employed by this industry are different and distinct...
4 min read
9,700 views

SCADA Hacking: SCADA Risk Assessment with CSET
In an earlier article, I laid out some of the varied methods of risk assessment in SCADA/ICS systems from academia, government and...
4 min read
2,456 views


SCADA Hacking: Hacking the Schneider Electric TM221 Modicon PLC using modbus-cli
SCADA/ICS security is probably the most important and most overlooked field of cyber security. In an era where cyber warfare is an...
4 min read
10,198 views


SCADA Hacking: SCADA/ICS Risk Assessment and Management, Part 1
Introduction One of the most crucial activities involved in securing SCADA/ICS systems is the initial Risk Assessment. Risk assessment...
4 min read
4,255 views


SCADA Hacking: SCADA Protocols (DNP3)
One the most important distinguishing characteristics of SCADA/ICS systems from that of traditional IT systems is that these systems ...
2 min read
11,025 views


SCADA Hacking: SCADA/ICS Communication Protocols (Modbus)
SCADA/ICS systems are differentiated from traditional information systems in a number of ways. Probably the most important...
4 min read
14,282 views


SCADA Hacking: Metasploit SCADA Modules
As a penetration tester/hacker, we have many resources we can use to test SCADA/ICS system security. One of the most popular is the...
1 min read
11,000 views

SCADA Hacking: Modbus Master/Slave Simulation
SCADA/ICS systems use many different protocols to communicate than your standard IT systems. The most widely used and the de facto...
3 min read
13,154 views