SCADA/ICS systems are among the greatest concerns for cyber warfare/cyber defense organizations. These systems are particularly vulnerable for several reasons, including– but not limited to–the fact that so many SCADA/ICS organizations have relied upon security through obscurity for so many years. These industrial control systems are critical to any nation’s infrastructure and, thereby, their economy. In this section, we will be showing how these systems can be found, hacked, and controlled. 

Like any type of hacking, we need to do reconnaissance first. You can’t hack what you don’t see. We’ll start with a few tutorials on how to find SCADA/ICS systems with Shodan, Google hacking, and Nmap. Then, we will progress to; 

(1) the basics of how these systems work including their primary protocols (Modbus, DNP3, ProfiBus, OPC, etc). 

(2) a few case studies of major SCADA/ICS hacks. 

(3) and finally, how to hack and exploit them.

For more information on Metasploit, check out these tutorials.

DON’T MISS OUT – The best training package for aspiring hackers JUST GOT BETTER

BE THE FIRST TO READ MASTER OTW’S NEW RELEASE Linux Basics for Hackers 2nd eDITION

all the books and training videos you need to start hacking for just $169 NOW INCLUDES the brand new second edition of Linux Basics for Hackers

Discover why thousands of hackers began their journey with Linux Basics for Hackers and why it is rated 4.7 stars with over 2,700 reviews on Amazon.

Learn Linux, Networking, Sec+ 701 certification, Radio Basics, Python, Wi-Fi Hacking, Remaining Anonymous, Cryptography, Wireshark, and Nmap – all in one bundle!

This bundle also includes Master OTW’s highly anticipated upcoming book, Python Basics for Hackers, and bestselling Network Basics for Hackers.

Plus, every month, one lucky purchaser will win

A FREE 3-YEAR TRAINING PACKAGE