This post describes how to develop and implement a TCP sequence prediction attack to inject malicious Modbus TCP packets with Scapy as part of the Virtual Industrial Cybersecurity Laboratory. Attack Design The Cyber Kill Chain is usually defined as follows: This...
The first step in every attack consists of a reconnaissance of the environment in order to identify vulnerabilities and attack vectors. Usually, attackers will use Nmap to discover the devices and open ports in the network, but in this case, we...
At this point, you should already have a physical process in FactoryIO controlled with OpenPLC. Now I will explain how to configure the virtual machine that will be used as the attacker, as can be seen in the following diagram: This...
In the previous post, we saw how to simulate the physical process with Factory IO. The last step before it is possible to start using the lab for some initial security testing (at least on a reduced state without HMI), will...
In the previous post, we saw how to install OpenPLC and ScadaBR. Now I will focus on the physical process simulation with FactoryIO. Before starting, it is necessary to remember that the objective for this lab is to build a suitable...