Top Banner
ICS / SCADA Cyber security Adithya Naresh SAP Labs
10

Introduction to ICS/SCADA security

Apr 14, 2017

Download

Technology

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Introduction to ICS/SCADA security

ICS / SCADA Cyber security

Adithya NareshSAP Labs

Page 2: Introduction to ICS/SCADA security

root@kali :-# whoami

• Security Enthusiast

• Been in ICS for 2 years in my previous employment

• Like to play around with windows executable

Page 3: Introduction to ICS/SCADA security

root@kali :-# ls -al ICS

Page 4: Introduction to ICS/SCADA security

root@kali :-# cat ICS

Page 5: Introduction to ICS/SCADA security

root@kali :-# sed -n ‘/vendors/p’ ICS

Page 6: Introduction to ICS/SCADA security
Page 7: Introduction to ICS/SCADA security

Sensors and actuators allow interaction with the physical world (pressure sensor, valves,

motors….)

Local HMI Human-Machine Interface, permits the supervision and control of a sub

process

PLC Programmable Logic Controller : manages the sensors and actuators

Supervision screen remote supervision of the industrial process

Data historian Records all the data from the production and Scada networks

RTU Remote Terminal Unit (standalone PLC)

Page 8: Introduction to ICS/SCADA security
Page 9: Introduction to ICS/SCADA security

run exploit

root@kali :-# echo “Demo Time”

Page 10: Introduction to ICS/SCADA security

root@kali :-# exit ICS

• https://ics-cert-training.inl.gov/ - ICS CERT VLP

• http://www.controlglobal.com/ - Top 50

• https://ics-radar.shodan.io - Shodan

• https://www.defcon.org - Defcon