Search
SCADA & ICS
SCADA and ICS security is a growing concern. Cybersecurity training on these vital systems identifying and mitigating potential threats that could disrupt essential services or cause catastrophic damage.


4 min read
SCADA Hacking: Attacking SCADA/ICS Systems through the Human Machine Interface (HMI)
Welcome back, my aspiring SCADA/ICS cyberwarriors! Let's begin by congratulating you on your foresight in committing to study SCADA/ICS...
5,394 views


4 min read
SCADA Hacking: Hacking the Schneider Automated Building System
SCADA and ICS systems control industrial processes around the world. Everything from railroads, to traffic lights, to oil refineries to...
12,538 views


3 min read
SCADA Hacking: Finding Vulnerable SCADA Systems using Google Hacking
Welcome back, my tenderfoot hackers! Google Hacking and Dorks As most of you know, Google crawls the globe and stores and indexes the...
15,390 views


5 min read
Metasploit Basics, Part 16: Metasploit SCADA Hacking
Metasploit is widely recognized as a powerful tool to conduct penetration testing and hacking on traditional IT systems, but few people...
15,211 views


6 min read
SCADA Hacking: Anatomy of Cyber War, the Stuxnet Attack
As you study SCADA/ICS hacking and security, it is useful to look back at some of the most successful SCADA/ICS attacks in history. In...
4,460 views


4 min read
Network Forensics, Part 2: Detecting and Analyzing a SCADA DoS Attack
Welcome back, my aspiring network forensic investigators! Now that you have a basic understanding of Wireshark and have conducted an...
5,346 views


5 min read
SCADA Hacking: DoSing a SCADA site
SCADA and Industrial Control Sites (ICS) are among the most crucial and most vulnerable sites. These sites include everything from...
7,543 views


5 min read
SCADA Hacking: Exploiting SCADA/ICS Systems with the Command Line Tool, modbus-cli
For those of you who have been following my series on SCADA hacking, you are aware that SCADA/ICS systems do NOT use the usual protocols...
14,746 views


1 min read
SCADA Hacking: Hackers-Arise First to Reveal Vulnerability Now Recognized by Schneider Electric and
Once again, Hackers-Arise receives international recognition in SCADA Hacking! On March 28, 2017, OTW detailed here how an attacker can...
664 views

7 min read
SCADA Hacking: Ladder Logic Programming Simulation of a PLC
Nearly every SCADA/ICS system is built around programmable logic controllers or PLC's. To understand the vulnerabilities of these...
5,405 views


1 min read
Hackers-Arise Gets International Recognition for Exploiting SCADA System Vulnerability
October 25, 2016, Voice of America (VOA) News (voanews.com) ran an article about the vulnerability of SCADA/ICS systems. In that article...
1,283 views

4 min read
SCADA Hacking: SCADA/ICS Protocols (Profinet/Profibus)
One of the challenges of hacking/pentesting SCADA/ICS has been that the protocols employed by this industry are different and distinct...
9,638 views

4 min read
SCADA Hacking: SCADA Risk Assessment with CSET
In an earlier article, I laid out some of the varied methods of risk assessment in SCADA/ICS systems from academia, government and...
2,454 views


4 min read
SCADA Hacking: Hacking the Schneider Electric TM221 Modicon PLC using modbus-cli
SCADA/ICS security is probably the most important and most overlooked field of cyber security. In an era where cyber warfare is an...
10,170 views


4 min read
SCADA Hacking: SCADA/ICS Risk Assessment and Management, Part 1
Introduction One of the most crucial activities involved in securing SCADA/ICS systems is the initial Risk Assessment. Risk assessment...
4,251 views


2 min read
SCADA Hacking: SCADA Protocols (DNP3)
One the most important distinguishing characteristics of SCADA/ICS systems from that of traditional IT systems is that these systems ...
10,991 views


4 min read
SCADA Hacking: SCADA/ICS Communication Protocols (Modbus)
SCADA/ICS systems are differentiated from traditional information systems in a number of ways. Probably the most important...
14,241 views


1 min read
SCADA Hacking: Metasploit SCADA Modules
As a penetration tester/hacker, we have many resources we can use to test SCADA/ICS system security. One of the most popular is the...
10,968 views

3 min read
SCADA Hacking: Modbus Master/Slave Simulation
SCADA/ICS systems use many different protocols to communicate than your standard IT systems. The most widely used and the de facto...
13,112 views


3 min read
SCADA Hacking: Testing and Monitoring our SCADA HoneyPot
In the previous article in this series, we built a sophisticated, low-interaction SCADA honeypot with conpot. In this article, we will...
4,003 views