ICS PENETRATION TESTING / RT431

FIVE   |   EIGHT   |   85%   |   40

           SCENARIOS                     LABS                      HANDS-ON          DURATION

SCADA (Supervisory Control and Data Acquisition) systems are considered the "weak link" in the defense chain, for reasons you will discover throughout the training. This training covers possible attack methods by hostile entities and the security challenges that naturally follow. Cyberwarfare is one of the most fascinating and advanced disciplines in the Cyber Security world.

LAB 01

Modbus and DNP3

LAB 02

ICS with Metasploit

LAB 03

ICS Protocols

LAB 04

Using Shodan to Attack

LAB 05

ICS Network Traffic

LAB 06

ICS Frameworks

LAB 07

Creating Zero-Days

LAB 08

Writing Penetration Report

Scenario: ICP001

The US Department of Homeland security is warning about vulnerabilities in a common SCADA package that is used to monitor and manage solar energy-generating power plants remotely. This type of attack allows unauthenticated remote attackers to gain administrative access and execute arbitrary commands. As the OT expert, your manager asks you to find the vulnerability and mitigation.

photo_2020-05-17_11-11-22.jpg

Scenario: ICP002

Security researchers have uncovered a new malware, named "Havex", which was used in several previous cyberattacks against organizations in the energy sector. IT researchers, suspecting a backdoor implementation that acts as a remote access Trojan. The local power station hired you to locate the RAT and mitigate it.

photo_2017-11-07_18-59-04.jpg

Scenario: ICP003

Security researchers have discovered a piece of malware that uses code from the Stuxnet malware and that target industrial control systems. Siemens factory in north Berlin suffered critical damage during the attack. The attack managed to replace a DLL file with a malicious copy, potentially allowing the malware to target their control system configuration.

photo_2020-05-14_16-43-41.jpg

Scenario: ICP004

A Chinese hacker linked to the Chinese army was caught breaking into a United States water control system, Honeypot. The honeypots mimicked the ICS/SCADA devices used in many critical infrastructure power and water plants.

photo_2020-05-17_11-23-38.jpg

Scenario: ICP005

Syringe infusion pump used in acute care settings could be remotely accessed and manipulated by hackers to impact the intended operation of the device. Your team leader asks you to test the infusion pumps and to run a vulnerability test on their systems.

photo_2017-09-09_16-50-47.jpg

© 2020 by ThinkCyber

THE 2020

CYBERIUM