Skip to content

Rodrigo Cantera

Menu
  • Blog
    • Virtual Industrial Cybersecurity Lab
      • Design and Deployment
        • Virtual Industrial Cybersecurity Lab – Part 0: Road to Virtualization
        • Virtual Industrial Cybersecurity Lab – Part 1: Installation and Configuration of pfSense
        • Virtual Industrial Cybersecurity Lab – Part 2: Installation of OpenPLC and ScadaBR
        • Virtual Industrial Cybersecurity Lab – Part 3: Simulating the Physical Process with Factory IO
        • Virtual Industrial Cybersecurity Lab – Part 4: Programming the Control Logic
        • Virtual Industrial Cybersecurity Lab – Part 5: Installation of the Attacker Machine
      • Attacking the ICS
        • Dissecting OpenPLC’s Modbus TCP Communications With Wireshark
        • Modbus TCP Packet Injection With Scapy
  • Resources
  • Contact
  • Español

Modbus TCP Packet Injection With Scapy

By Rodrigo Cantera 04/04/2021 Attacking the ICS, Virtual Industrial Cybersecurity Lab 0 Comments
Inyección de paquete ModbusTCP con Scapy
This post describes how to develop and implement a TCP sequence prediction attack to inject malicious Modbus TCP packets with Scapy as part of the Virtual Industrial Cybersecurity Laboratory. Attack Design The Cyber Kill Chain is usually defined as follows: This...
[Continue reading...]

Dissecting OpenPLC’s Modbus TCP Communications With Wireshark

By Rodrigo Cantera 23/01/2021 Attacking the ICS, Virtual Industrial Cybersecurity Lab 0 Comments
OpenPLC’s communication loop
The first step in every attack consists of a reconnaissance of the environment in order to identify vulnerabilities and attack vectors. Usually, attackers will use Nmap to discover the devices and open ports in the network, but in this case, we...
[Continue reading...]

Virtual Industrial Cybersecurity Lab – Part 5: Installation of the Attacker Machine

By Rodrigo Cantera 04/01/2021 Design and Deployment, Virtual Industrial Cybersecurity Lab 0 Comments
Ping Google open OpenPLC to check the correct installation of the attacker machine
At this point, you should already have a physical process in FactoryIO controlled with OpenPLC. Now I will explain how to configure the virtual machine that will be used as the attacker, as can be seen in the following diagram: This...
[Continue reading...]

Virtual Industrial Cybersecurity Lab – Part 4: Programming the Control Logic

By Rodrigo Cantera 01/01/2021 Design and Deployment, Virtual Industrial Cybersecurity Lab 0 Comments
In the previous post, we saw how to simulate the physical process with Factory IO. The last step before it is possible to start using the lab for some initial security testing (at least on a reduced state without HMI), will...
[Continue reading...]

Virtual Industrial Cybersecurity Lab – Part 3: Simulating the Physical Process with Factory IO

By Rodrigo Cantera 01/01/2021 Design and Deployment, Virtual Industrial Cybersecurity Lab 0 Comments
In the previous post, we saw how to install OpenPLC and ScadaBR. Now I will focus on the physical process simulation with FactoryIO. Before starting, it is necessary to remember that the objective for this lab is to build a suitable...
[Continue reading...]

Posts navigation

1 2
A notepad about Industrial Cybersecurity
Loading

Categories

  • Virtual Industrial Cybersecurity Lab (8)
    • Attacking the ICS (2)
    • Design and Deployment (6)

Recent Posts

  • Modbus TCP Packet Injection With Scapy
  • Dissecting OpenPLC’s Modbus TCP Communications With Wireshark
  • Virtual Industrial Cybersecurity Lab – Part 5: Installation of the Attacker Machine
  • Virtual Industrial Cybersecurity Lab – Part 4: Programming the Control Logic
  • Virtual Industrial Cybersecurity Lab – Part 3: Simulating the Physical Process with Factory IO
Rodrigo Cantera Copyright © 2023.
Theme by MyThemeShop. Back to Top ↑