Assessing and Exploiting Production Control Networks

Examples when to use

Overview of methodology

DNS interrogation

Port Scanning

Technology Fingerprinting

Protocol Enumeration

Vulnerability Scanning

Vulnerability validation

Software

  ControlThings Platform Virtual Machine