11th - 12th September | 2 Days
Marko Schuba & Hans Wilhelm
2. Module 1 : Overview of components of an industrial control system
- Industrial control system (ICS)
- Distributed control system (DCS)
- Supervisory control and data acquisition (SCADA)
- Programmable logic controller (PLC)
- Ladder logic
- Remote terminal unit (RTU)
- Intelligent electronic device (IED)
- Master terminal server (MTS)
- Human machine interface (HMI)
- Sensors, actors
- Engineering Workstation (EWS)
- Data Historian
- Hierarchical structure of an ICS
- Strengths and weaknesses of an ICS
3. Module 2 : ICS protocols
4. Practical training : Inspect ICS protocols with Wireshark a. Modbus
5. Practical exercise : Attack on the Modbus protocol
6. Practical exercise : Find ICS systems with SHODAN
7. Practical exercise : Attack on a remote maintenance connection
8. Practical exercise : Attacks via the website
- SQL injection
- Cookie injection (Schneider PLC)
- Change input values
- Command injection
9. Practical exercise : Attack a Windows HMI>
10. Practical exercise : Attack a WAGO PLC
Why should you attend this training?
IT security in the industrial environment requires expertise in three areas: IT, automation, and security. If you are a technically skilled person but lack one or two of those specific skills: this training is a good starting point for you to obtain the necessary ICS security knowledge by combining all three areas in a compact and easy to understand way.
What should you know?
Basic network knowledge (what is an IP / MAC address, what is TCP / UDP) should be present. Further, IT, automation or security skills are welcome, but not mandatory. Experience with Virtual Machines (VirtualBox) is definitely helpful.
What do I have to bring?
A Windows PC / Notebook / Tablet with an at least I5 processor (better: I7), 8 GB RAM (better: 16 GB), the latest version of Oracle VirtualBox installed, and an HD with at least 50 GB free space.
What will I do?
After short theoretical part, we will to a lot of practical hacking scenarios with real devices or with virtual machines.