Pentesting Industrial Control Systems
On this intense 2-day training, you will learn everything you need to start pentesting Industrial Control Networks. We will cover the basics to help you understand the most common ICS vulnerabilities. We will then spend some time learning and exploiting Windows & Active Directory weaknesses, as most ICS are controlled by Windows systems.
We will cover the most common ICS protocols (Modbus, S7, Profinet, Ethernet/IP, DNP3, OPC…), analyze packet captures and learn how to use these protocols to talk to Programmable Logic Controllers (PLCs). You will learn how to program a PLC, to better understand how to exploit them.
The training will end with a challenging hands-on exercise: The first CTF in which you capture a real flag! Using your newly acquired skills, you will try to compromise a Windows Active Directory, pivot to an ICS setup to take control of a model train and robotic arms.
This training is heavily based on hands-on exercises, based both on simulated and real environments.
- Introduction to ICS
- A brief history of ICS
- The CIM model
- ICS architectures
- ICS components (PLCs, HMI, SCADA, DCS, sensors, RTUs, Historian, etc) and their roles
- OT vs IT
- Pentesting basics & Windows security
- OSINT for ICS : Where to look to find informations
- Reconnaissance : how to portscan & nessus
- Exploitation : Metasploit basics
- Common ICS vulnerabilities
- Organization & awareness
- Lack of network segmentation / Exposure
- Vulnerability management
- ICS protocols insecurity
- Third party management
- Lack of security supervision
- ICS protocols
- Programming PLCs
- Ladder logic and other programming languages
- Creation of basic ladder logic programs
- Pentesting ICS
- Theory and general warning
- Common weaknesses of PLCs
- Talking industrial protocols : Modbus, S7 (using PLC simulators and SCADA VMs)
- Demos of specific features of Schneider PLCs
- Additional PLC features: web server, ftp, snmp, …
- Securing ICS
- Major ICS security standards
- Data exchange with corporate network
- Network anomaly detection
- Introduction to safety for security pros
- Capture The Flag
- Use your newly acquired skills to perform ICS pentesting in a realistic environment (Several Windows machines, network segmentation, real PLCs from different manufacturers)
A basic knowledge of networking and command line is required, as well as the ability to work with virtual machines. A background in penetration testing is a plus, but not absolutely required as I’ll cover the basic steps through the training.
Attendees must bring a laptop with a recent version of VirtualBox and the ability to run 64-bit virtual machines. The bare minimum is 4GB of RAM (with 8 highly recommended) and about 50Gb of available disk space. It is also possible to use alternative virtualization software (Workstation, Fusion..) but some configuration details (like networking) are usually lost when importing the virtual machines and require additional setup time.