Introduction to ICS/SCADA security

10
ICS / SCADA Cyber security Adithya Naresh SAP Labs

Transcript of Introduction to ICS/SCADA security

Page 1: Introduction to ICS/SCADA security

ICS / SCADA Cyber security

Adithya NareshSAP Labs

Page 2: Introduction to ICS/SCADA security

root@kali :-# whoami

• Security Enthusiast

• Been in ICS for 2 years in my previous employment

• Like to play around with windows executable

Page 3: Introduction to ICS/SCADA security

root@kali :-# ls -al ICS

Page 4: Introduction to ICS/SCADA security

root@kali :-# cat ICS

Page 5: Introduction to ICS/SCADA security

root@kali :-# sed -n ‘/vendors/p’ ICS

Page 6: Introduction to ICS/SCADA security
Page 7: Introduction to ICS/SCADA security

Sensors and actuators allow interaction with the physical world (pressure sensor, valves,

motors….)

Local HMI Human-Machine Interface, permits the supervision and control of a sub

process

PLC Programmable Logic Controller : manages the sensors and actuators

Supervision screen remote supervision of the industrial process

Data historian Records all the data from the production and Scada networks

RTU Remote Terminal Unit (standalone PLC)

Page 8: Introduction to ICS/SCADA security
Page 9: Introduction to ICS/SCADA security

run exploit

root@kali :-# echo “Demo Time”

Page 10: Introduction to ICS/SCADA security

root@kali :-# exit ICS

• https://ics-cert-training.inl.gov/ - ICS CERT VLP

• http://www.controlglobal.com/ - Top 50

• https://ics-radar.shodan.io - Shodan

• https://www.defcon.org - Defcon