User Tools

Site Tools


atrc_website:control_networks_assessment

Assessing and Exploiting Production Control Networks

Examples when to use

Overview of methodology

DNS interrogation

  • When DNS is and when it is not available
  • Using but not abusing DNS

Port Scanning

  • How and why control systems break on port scans
  • Nmap options to avoid
  • General Nmap recommendations
  • Recommended Nmap scans from low to high risk

Technology Fingerprinting

  • Safe and unsafe fingerprinting technologies
  • Alternatives to traditional fingerprinting

Protocol Enumeration

  • Common IT protocols that are generally safe to enumerate on control systems
  • Avoiding automatic enumerating of web interfaces on control systems
  • Dangers of enumeration control protocols in production

Vulnerability Scanning

  • Plugins and configuration that break control systems
  • Recommended settings for Nessus
  • Using audits
  • Again, the dangers of automated tools on web apps and services

Vulnerability validation

  • Exploitation
  • Post Exploitation / Cleanup

Software

  ControlThings Platform Virtual Machine
  
  
atrc_website/control_networks_assessment.txt · Last modified: 2022/07/20 16:49 by wikiadmin