SlideShare a Scribd company logo
1 of 94
SCADACSSCADACS
SCADA & Computer Security
Find Them, Bind Them – Industrial Control Systems (ICS) on the Internet
Johannes Klick Daniel Marzin
Secure Identity Research Group - Freie Universität Berlin
PHDays - may 2013 - Moscow Russia
Outline
Introduction
What is a SCADA system?
Our playground
Exploits on the Internet
Start/Stop Exploit
How to find ICS on the Internet
Industrial Risk Assessment Map - IRAM
SCADACS Search Engine - SSE
Evaluation of SHODAN (Preview)
Outlook
Joint Data Integration and Information
,
SCADACS, ICS on the Internet, PHDays 2013 2
Outline
Introduction
What is a SCADA system?
Our playground
Exploits on the Internet
Start/Stop Exploit
How to find ICS on the Internet
Industrial Risk Assessment Map - IRAM
SCADACS Search Engine - SSE
Evaluation of SHODAN (Preview)
Outlook
Joint Data Integration and Information
,
SCADACS, ICS on the Internet, PHDays 2013 3
Introduction
Prof. Dr. Volker Roth
Jan-Ole Malchow
Mateusz Khalil
Philipp Lämmel
Sascha Zinke
Robert Fehrmann
,
SCADACS, ICS on the Internet, PHDays 2013 4
Introduction
Founded October 2012
Testlab
Research on
Finding ICS on the Internet
MC7-Disassembler / binary
analysis
ICS specific communication
protocols
Exploits
Stay tuned!
,
SCADACS, ICS on the Internet, PHDays 2013 5
Outline
Introduction
What is a SCADA system?
Our playground
Exploits on the Internet
Start/Stop Exploit
How to find ICS on the Internet
Industrial Risk Assessment Map - IRAM
SCADACS Search Engine - SSE
Evaluation of SHODAN (Preview)
Outlook
Joint Data Integration and Information
,
SCADACS, ICS on the Internet, PHDays 2013 6
What is a SCADA system?
SCADA (Supervisory Control And Data Acquisition)
Controls and monitors industrial (often critical) processes
Common system components
Programmable logic controllers (PLCs)
Read sensors
Control actuators
Remote terminal units (RTU)
PLC to SCADA bridge
Human machine interface (HMI)
,
SCADACS, ICS on the Internet, PHDays 2013 7
Outline
Introduction
What is a SCADA system?
Our playground
Exploits on the Internet
Start/Stop Exploit
How to find ICS on the Internet
Industrial Risk Assessment Map - IRAM
SCADACS Search Engine - SSE
Evaluation of SHODAN (Preview)
Outlook
Joint Data Integration and Information
,
SCADACS, ICS on the Internet, PHDays 2013 8
Our playground
Sponsored by
Siemens Simatic S7-300
CPU - 313C 313-5BF03-0ABP
Network module - CPC 343
1GX30-0XE0
Industrial grade PLC
(midrange)
Programmable e.g. with STL
Binary language MC7
,
SCADACS, ICS on the Internet, PHDays 2013 9
Our playground
Setup like described in W32.Stuxnet Dossier (Symantec 2010/2011)
,
SCADACS, ICS on the Internet, PHDays 2013 10
Our playground
Siemens Simatic S7-1200
CPU - 1200 1212C
212-1BE31-0XB0
GSM Module - CP 1247-7
GPRS
HMI - KTP400 Basic color PN
Industrial grade PLC (lower
end)
Programmable e.g. with STL
,
SCADACS, ICS on the Internet, PHDays 2013 11
Outline
Introduction
What is a SCADA system?
Our playground
Exploits on the Internet
Start/Stop Exploit
How to find ICS on the Internet
Industrial Risk Assessment Map - IRAM
SCADACS Search Engine - SSE
Evaluation of SHODAN (Preview)
Outlook
Joint Data Integration and Information
,
SCADACS, ICS on the Internet, PHDays 2013 12
Exploits on the Internet
,
SCADACS, ICS on the Internet, PHDays 2013 13
Exploits
Search tags e.g. simatic
Search on one of the following websites
cve.mitre.org (Common Vulnerabilities and Exposures)
www.osvdb.org (Open Source Vulnerability Database)
www.exploit-db.com (Exploit Database)
packetstormsecurity.com (Packet Storm Security)
www.metasploit.com (Metasploit)
,
SCADACS, ICS on the Internet, PHDays 2013 14
Outline
Introduction
What is a SCADA system?
Our playground
Exploits on the Internet
Start/Stop Exploit
How to find ICS on the Internet
Industrial Risk Assessment Map - IRAM
SCADACS Search Engine - SSE
Evaluation of SHODAN (Preview)
Outlook
Joint Data Integration and Information
,
SCADACS, ICS on the Internet, PHDays 2013 15
Start/Stop Exploit
Example of public available exploit
Siemens Simatic S7 300/400 CPU START/STOP Module
Metasploit Module
Dillon Beresford (Black Hat US 2011)
Function
Send start command
Send a sequence of stop commands
Our analysis
It works now
Identified the packets
Removed unnecessary packets (two thirds)
,
SCADACS, ICS on the Internet, PHDays 2013 16
Exploits
,
SCADACS, ICS on the Internet, PHDays 2013 17
Exploits
,
SCADACS, ICS on the Internet, PHDays 2013 18
Exploits
Without Metasploit
libnodave (libnodave.sourceforge.net)
From Zottel (sps-forum.de) Great Work!
Programs to demonstrate the functionality
Including start/stop tests
,
SCADACS, ICS on the Internet, PHDays 2013 19
Exploits
Stop Exploit - Demo / Video
,
SCADACS, ICS on the Internet, PHDays 2013 20
Outline
Introduction
What is a SCADA system?
Our playground
Exploits on the Internet
Start/Stop Exploit
How to find ICS on the Internet
Industrial Risk Assessment Map - IRAM
SCADACS Search Engine - SSE
Evaluation of SHODAN (Preview)
Outlook
Joint Data Integration and Information
,
SCADACS, ICS on the Internet, PHDays 2013 21
How to find ICS on the Internet
,
SCADACS, ICS on the Internet, PHDays 2013 22
How to find ICS on the Internet
SHODAN
shodanhq.com
Scans for HTTP(S), Telnet, SNMP, FTP and NetBios
,
SCADACS, ICS on the Internet, PHDays 2013 23
How to find ICS on the Internet
shodanhq.com
Scans for HTTP(S), Telnet, SNMP, FTP and NetBios
Oldest results dating back to 2010
,
SCADACS, ICS on the Internet, PHDays 2013 23
How to find ICS on the Internet
shodanhq.com
Scans for HTTP(S), Telnet, SNMP, FTP and NetBios
Oldest results dating back to 2010
Provides an API and search filters for protocols, dates, etc.
,
SCADACS, ICS on the Internet, PHDays 2013 23
How to find ICS on the Internet
Devices found on SHODAN
Type Count
Human Machine Interface 295
Uninterruptible Power Supply
Enterprise-Resource-Planning
Supervisory Control and Data Acquisition
PLC Network Device
Programmable Logic Controller
Building Management System
The industry and PLC manufacturer claim that ICS are not connected to the
Internet!
SCADACS, ICS on the Internet, PHDays 2013 24
How to find ICS on the Internet
Devices found on SHODAN
Type Count
Human Machine Interface 295
Uninterruptible Power Supply 664
Enterprise-Resource-Planning
Supervisory Control and Data Acquisition
PLC Network Device
Programmable Logic Controller
Building Management System
The industry and PLC manufacturer claim that ICS are not connected to the
Internet!
SCADACS, ICS on the Internet, PHDays 2013 24
How to find ICS on the Internet
Devices found on SHODAN
Type Count
Human Machine Interface 295
Uninterruptible Power Supply 664
Enterprise-Resource-Planning 1222
Supervisory Control and Data Acquisition
PLC Network Device
Programmable Logic Controller
Building Management System
The industry and PLC manufacturer claim that ICS are not connected to the
Internet!
SCADACS, ICS on the Internet, PHDays 2013 24
How to find ICS on the Internet
Devices found on SHODAN
Type Count
Human Machine Interface 295
Uninterruptible Power Supply 664
Enterprise-Resource-Planning 1222
Supervisory Control and Data Acquisition 3258
PLC Network Device
Programmable Logic Controller
Building Management System
The industry and PLC manufacturer claim that ICS are not connected to the
Internet!
SCADACS, ICS on the Internet, PHDays 2013 24
How to find ICS on the Internet
Devices found on SHODAN
Type Count
Human Machine Interface 295
Uninterruptible Power Supply 664
Enterprise-Resource-Planning 1222
Supervisory Control and Data Acquisition 3258
PLC Network Device 9772
Programmable Logic Controller
Building Management System
The industry and PLC manufacturer claim that ICS are not connected to the
Internet!
SCADACS, ICS on the Internet, PHDays 2013 24
How to find ICS on the Internet
Devices found on SHODAN
Type Count
Human Machine Interface 295
Uninterruptible Power Supply 664
Enterprise-Resource-Planning 1222
Supervisory Control and Data Acquisition 3258
PLC Network Device 9772
Programmable Logic Controller 20501
Building Management System
The industry and PLC manufacturer claim that ICS are not connected to the
Internet!
SCADACS, ICS on the Internet, PHDays 2013 24
How to find ICS on the Internet
Devices found on SHODAN
Type Count
Human Machine Interface 295
Uninterruptible Power Supply 664
Enterprise-Resource-Planning 1222
Supervisory Control and Data Acquisition 3258
PLC Network Device 9772
Programmable Logic Controller 20501
Building Management System 47764
The industry and PLC manufacturer claim that ICS are not connected to the
Internet!
,
SCADACS, ICS on the Internet, PHDays 2013 24
How to find ICS on the Internet
,
SCADACS, ICS on the Internet, PHDays 2013 25
How to find ICS on the Internet
Project SHINE
infracritical.org
Running since 2012-04-14
SCADACS, ICS on the Internet, PHDays 2013 26
How to find ICS on the Internet
infracritical.org
Running since 2012-04-14
Found over 500,000 ICS related entries on SHODAN
(ICS-ALERT-13-016A)
SCADACS, ICS on the Internet, PHDays 2013 26
How to find ICS on the Internet
infracritical.org
Running since 2012-04-14
Found over 500,000 ICS related entries on SHODAN
(ICS-ALERT-13-016A)
U.S. DHS reduced the list to 20,000 devices
SCADACS, ICS on the Internet, PHDays 2013 26
How to find ICS on the Internet
infracritical.org
Running since 2012-04-14
Found over 500,000 ICS related entries on SHODAN
(ICS-ALERT-13-016A)
U.S. DHS reduced the list to 20,000 devices
List has since grown to over 800k entries
SCADACS, ICS on the Internet, PHDays 2013 26
Outline
Introduction
What is a SCADA system?
Our playground
Exploits on the Internet
Start/Stop Exploit
How to find ICS on the Internet
Industrial Risk Assessment Map - IRAM
SCADACS Search Engine - SSE
Evaluation of SHODAN (Preview)
Outlook
Joint Data Integration and Information
,
SCADACS, ICS on the Internet, PHDays 2013 27
Industrial Risk Assessment Map - IRAM
,
SCADACS, ICS on the Internet, PHDays 2013 28
Industrial Risk Assessment Map - IRAM
Data source: SHODAN
,
SCADACS, ICS on the Internet, PHDays 2013 29
Industrial Risk Assessment Map - IRAM
Data source: SHODAN
83,541 devices
,
SCADACS, ICS on the Internet, PHDays 2013 29
Industrial Risk Assessment Map - IRAM
Data source: SHODAN
83,541 devices
83 SHODAN search terms e.g.
SIMATIC
SoftPLC
Rockwell Automation+1769
i.LON
inline+controller
,
SCADACS, ICS on the Internet, PHDays 2013 29
Industrial Risk Assessment Map - IRAM
IRAM - 1. DEMO / VIDEO
,
SCADACS, ICS on the Internet, PHDays 2013 30
Outline
Introduction
What is a SCADA system?
Our playground
Exploits on the Internet
Start/Stop Exploit
How to find ICS on the Internet
Industrial Risk Assessment Map - IRAM
SCADACS Search Engine - SSE
Evaluation of SHODAN (Preview)
Outlook
Joint Data Integration and Information
,
SCADACS, ICS on the Internet, PHDays 2013 31
SCADACS Search Engine - SSE
,
SCADACS, ICS on the Internet, PHDays 2013 32
SCADACS Search Engine - SSE
SCADACS Search Engine
C implementation using raw sockets
,
SCADACS, ICS on the Internet, PHDays 2013 33
SCADACS Search Engine - SSE
SCADACS Search Engine
C implementation using raw sockets
Currently scanning at 2,500 IP / s ... (possible up to 25,000 IP / s)
,
SCADACS, ICS on the Internet, PHDays 2013 33
SCADACS Search Engine - SSE
SCADACS Search Engine
C implementation using raw sockets
Currently scanning at 2,500 IP / s ... (possible up to 25,000 IP / s)
Services: HTTP(S), Telnet, S7com, Modbus, (SNMP)
,
SCADACS, ICS on the Internet, PHDays 2013 33
SCADACS Search Engine - SSE
SCADACS Search Engine
C implementation using raw sockets
Currently scanning at 2,500 IP / s ... (possible up to 25,000 IP / s)
Services: HTTP(S), Telnet, S7com, Modbus, (SNMP)
Future protocols: BACnet, OPC, SRTP
,
SCADACS, ICS on the Internet, PHDays 2013 33
SCADACS Search Engine - SSE
S7 Communication (Siemens PLCs)
Proprietary protocol
Modbus
SCADACS, ICS on the Internet, PHDays 2013 34
SCADACS Search Engine - SSE
S7 Communication (Siemens PLCs)
Proprietary protocol
Existing code: libnodave and plcscan
Modbus
SCADACS, ICS on the Internet, PHDays 2013 34
SCADACS Search Engine - SSE
S7 Communication (Siemens PLCs)
Proprietary protocol
Existing code: libnodave and plcscan
Modbus
Open protocol
SCADACS, ICS on the Internet, PHDays 2013 34
SCADACS Search Engine - SSE
S7 Communication (Siemens PLCs)
Proprietary protocol
Existing code: libnodave and plcscan
Modbus
Open protocol
Many opensource tools (e.g. plcscan)
SCADACS, ICS on the Internet, PHDays 2013 34
SCADACS Search Engine - SSE
Thanks to SCADA StrangeLove for plcscan tool!
,
SCADACS, ICS on the Internet, PHDays 2013 35
SCADACS Search Engine - SSE
First Scan Project - Setup
Seeding with 7,000 whois queries on IPs found via SHODAN
SCADACS, ICS on the Internet, PHDays 2013 36
SCADACS Search Engine - SSE
First Scan Project - Setup
Seeding with 7,000 whois queries on IPs found via SHODAN
4,213 European IP Blocks
SCADACS, ICS on the Internet, PHDays 2013 36
SCADACS Search Engine - SSE
First Scan Project - Setup
Seeding with 7,000 whois queries on IPs found via SHODAN
4,213 European IP Blocks
283 Mio. IPs (6.58% of IPv4 address space)
SCADACS, ICS on the Internet, PHDays 2013 36
SCADACS Search Engine - SSE
First Scan Project - Results (Preview)
10,266 ICS/BMS related answers
,
SCADACS, ICS on the Internet, PHDays 2013 37
SCADACS Search Engine - SSE
First Scan Project - Results (Preview)
10,266 ICS/BMS related answers
436 via S7 Communication
,
SCADACS, ICS on the Internet, PHDays 2013 37
SCADACS Search Engine - SSE
First Scan Project - Results (Preview)
10,266 ICS/BMS related answers
436 via S7 Communication
2571 via Modbus
,
SCADACS, ICS on the Internet, PHDays 2013 37
SCADACS Search Engine - SSE
First Scan Project - Results (Preview)
10,266 ICS/BMS related answers
436 via S7 Communication
2571 via Modbus
602 IP Blocks (Modbus / S7)
,
SCADACS, ICS on the Internet, PHDays 2013 37
SCADACS Search Engine - SSE
First Scan Project - Results (Preview)
10,266 ICS/BMS related answers
436 via S7 Communication
2571 via Modbus
602 IP Blocks (Modbus / S7)
132 IP Blocks used for dynamic IPs
,
SCADACS, ICS on the Internet, PHDays 2013 37
SCADACS Search Engine - SSE
6 IP blocks owned by a big manufacturer
6.25% of their IPs are answering to Modbus requests
8 IP blocks owned by critical infrastructure
SCADACS, ICS on the Internet, PHDays 2013 38
SCADACS Search Engine - SSE
6 IP blocks owned by a big manufacturer
6.25% of their IPs are answering to Modbus requests
8 IP blocks owned by critical infrastructure
16% of their IPs are answering to S7 Communication requests
SCADACS, ICS on the Internet, PHDays 2013 38
SCADACS Search Engine - SSE
IRAM and SSE (green: Modbus, red: S7 communication)
,
SCADACS, ICS on the Internet, PHDays 2013 39
Outline
Introduction
What is a SCADA system?
Our playground
Exploits on the Internet
Start/Stop Exploit
How to find ICS on the Internet
Industrial Risk Assessment Map - IRAM
SCADACS Search Engine - SSE
Evaluation of SHODAN (Preview)
Outlook
Joint Data Integration and Information
,
SCADACS, ICS on the Internet, PHDays 2013 40
Evaluation of SHODAN (Preview)
,
SCADACS, ICS on the Internet, PHDays 2013 41
Evaluation of SHODAN (Preview)
Scan of a SHODAN sample set (7,000 devices)
Approx. 15 % of devices found on SHODAN are reachable at a given
time
,
SCADACS, ICS on the Internet, PHDays 2013 42
Evaluation of SHODAN (Preview)
IPs crawled by
SHODAN: Approx. 4,000,000,000 IPs (worldwide)
Search time used
SCADACS, ICS on the Internet, PHDays 2013 43
Evaluation of SHODAN (Preview)
IPs crawled by
SHODAN: Approx. 4,000,000,000 IPs (worldwide)
SSE: 283,000,000 IPs (Europe)
Search time used
SCADACS, ICS on the Internet, PHDays 2013 43
Evaluation of SHODAN (Preview)
IPs crawled by
SHODAN: Approx. 4,000,000,000 IPs (worldwide)
SSE: 283,000,000 IPs (Europe)
Search time used
SHODAN: 1080 days (~3 years)
SCADACS, ICS on the Internet, PHDays 2013 43
Evaluation of SHODAN (Preview)
IPs crawled by
SHODAN: Approx. 4,000,000,000 IPs (worldwide)
SSE: 283,000,000 IPs (Europe)
Search time used
SHODAN: 1080 days (~3 years)
SSE: 2 days
SCADACS, ICS on the Internet, PHDays 2013 43
Evaluation of SHODAN (Preview)
S7 devices found
SHODAN: 444
Overlap of SHODAN and SSE
SCADACS, ICS on the Internet, PHDays 2013 44
Evaluation of SHODAN (Preview)
S7 devices found
SHODAN: 444
SSE: 436
Overlap of SHODAN and SSE
SCADACS, ICS on the Internet, PHDays 2013 44
Evaluation of SHODAN (Preview)
S7 devices found
SHODAN: 444
SSE: 436
Overlap of SHODAN and SSE
125 S7 devices
~28%
SCADACS, ICS on the Internet, PHDays 2013 44
Outline
Introduction
What is a SCADA system?
Our playground
Exploits on the Internet
Start/Stop Exploit
How to find ICS on the Internet
Industrial Risk Assessment Map - IRAM
SCADACS Search Engine - SSE
Evaluation of SHODAN (Preview)
Outlook
Joint Data Integration and Information
,
SCADACS, ICS on the Internet, PHDays 2013 45
Outlook
,
SCADACS, ICS on the Internet, PHDays 2013 46
Outline
Introduction
What is a SCADA system?
Our playground
Exploits on the Internet
Start/Stop Exploit
How to find ICS on the Internet
Industrial Risk Assessment Map - IRAM
SCADACS Search Engine - SSE
Evaluation of SHODAN (Preview)
Outlook
Joint Data Integration and Information
,
SCADACS, ICS on the Internet, PHDays 2013 47
Joint Data Integration and Information
Combine the presented results into one tool
Industrial Risk Assessment Map - IRAM
What do we get?
,
SCADACS, ICS on the Internet, PHDays 2013 48
Joint Data Integration and Information
Combine the presented results into one tool
Industrial Risk Assessment Map - IRAM
SCADACS Search Engine - SSE
What do we get?
,
SCADACS, ICS on the Internet, PHDays 2013 48
Joint Data Integration and Information
Combine the presented results into one tool
Industrial Risk Assessment Map - IRAM
SCADACS Search Engine - SSE
Exploits
What do we get?
,
SCADACS, ICS on the Internet, PHDays 2013 48
Joint Data Integration and Information
Easy to use point and click interface
What could it look like?
SCADACS, ICS on the Internet, PHDays 2013 49
Joint Data Integration and Information
Easy to use point and click interface
Sophisticated target selection (per country, owner, device type, etc.)
What could it look like?
SCADACS, ICS on the Internet, PHDays 2013 49
Joint Data Integration and Information
Easy to use point and click interface
Sophisticated target selection (per country, owner, device type, etc.)
Integrated vulnerability and exploit database
What could it look like?
SCADACS, ICS on the Internet, PHDays 2013 49
Joint Data Integration and Information
Easy to use point and click interface
Sophisticated target selection (per country, owner, device type, etc.)
Integrated vulnerability and exploit database
Direct access to network informations (ping, whois, reverse DNS)
What could it look like?
SCADACS, ICS on the Internet, PHDays 2013 49
Joint Data Integration and Information
Easy to use point and click interface
Sophisticated target selection (per country, owner, device type, etc.)
Integrated vulnerability and exploit database
Direct access to network informations (ping, whois, reverse DNS)
Seamless integration of further data sources
What could it look like?
SCADACS, ICS on the Internet, PHDays 2013 49
Joint Data Integration and Information
Easy to use point and click interface
Sophisticated target selection (per country, owner, device type, etc.)
Integrated vulnerability and exploit database
Direct access to network informations (ping, whois, reverse DNS)
Seamless integration of further data sources
Social networks
What could it look like?
SCADACS, ICS on the Internet, PHDays 2013 49
Joint Data Integration and Information
Easy to use point and click interface
Sophisticated target selection (per country, owner, device type, etc.)
Integrated vulnerability and exploit database
Direct access to network informations (ping, whois, reverse DNS)
Seamless integration of further data sources
Social networks
Current geopolitical informations
What could it look like?
SCADACS, ICS on the Internet, PHDays 2013 49
Joint Data Integration and Information
Easy to use point and click interface
Sophisticated target selection (per country, owner, device type, etc.)
Integrated vulnerability and exploit database
Direct access to network informations (ping, whois, reverse DNS)
Seamless integration of further data sources
Social networks
Current geopolitical informations
Network perimeters
What could it look like?
SCADACS, ICS on the Internet, PHDays 2013 49
Joint Data Integration and Information
Easy to use point and click interface
Sophisticated target selection (per country, owner, device type, etc.)
Integrated vulnerability and exploit database
Direct access to network informations (ping, whois, reverse DNS)
Seamless integration of further data sources
Social networks
Current geopolitical informations
Network perimeters
Flow of IP packets
What could it look like?
SCADACS, ICS on the Internet, PHDays 2013 49
Joint Data Integration and Information
Easy to use point and click interface
Sophisticated target selection (per country, owner, device type, etc.)
Integrated vulnerability and exploit database
Direct access to network informations (ping, whois, reverse DNS)
Seamless integration of further data sources
Social networks
Current geopolitical informations
Network perimeters
Flow of IP packets
Direct execution of exploits
What could it look like?
SCADACS, ICS on the Internet, PHDays 2013 49
Joint Data Integration and Information
Easy to use point and click interface
Sophisticated target selection (per country, owner, device type, etc.)
Integrated vulnerability and exploit database
Direct access to network informations (ping, whois, reverse DNS)
Seamless integration of further data sources
Social networks
Current geopolitical informations
Network perimeters
Flow of IP packets
Direct execution of exploits
Up to your imagination...
What could it look like?
SCADACS, ICS on the Internet, PHDays 2013 49
Joint Data Integration and Information
,
SCADACS, ICS on the Internet, PHDays 2013 50
The End
Thank you for your attention.
,
SCADACS, ICS on the Internet, PHDays 2013 51

More Related Content

What's hot

Industrial protocols for pentesters
Industrial protocols for pentestersIndustrial protocols for pentesters
Industrial protocols for pentestersPositive Hack Days
 
Security testing in critical systems
Security testing in critical systemsSecurity testing in critical systems
Security testing in critical systemsPeter Wood
 
Safety vs Security: How to Create Insecure Safety-Critical System
Safety vs Security: How to Create Insecure Safety-Critical SystemSafety vs Security: How to Create Insecure Safety-Critical System
Safety vs Security: How to Create Insecure Safety-Critical SystemAleksandr Timorin
 
Industrial protocols for pentesters
Industrial protocols for pentestersIndustrial protocols for pentesters
Industrial protocols for pentestersAleksandr Timorin
 
SCADA deep inside:protocols and software architecture
SCADA deep inside:protocols and software architectureSCADA deep inside:protocols and software architecture
SCADA deep inside:protocols and software architectureqqlan
 
S4x16 europe krotofil_granular_dataflowsics
S4x16 europe krotofil_granular_dataflowsicsS4x16 europe krotofil_granular_dataflowsics
S4x16 europe krotofil_granular_dataflowsicsMarina Krotofil
 
ICS/SCADA/PLC Google/Shodanhq Cheat Sheet v2
ICS/SCADA/PLC Google/Shodanhq Cheat Sheet v2ICS/SCADA/PLC Google/Shodanhq Cheat Sheet v2
ICS/SCADA/PLC Google/Shodanhq Cheat Sheet v2qqlan
 
Scada Classification By-Rahul Mehra
Scada Classification By-Rahul MehraScada Classification By-Rahul Mehra
Scada Classification By-Rahul MehraRahul Mehra
 
SCADA (Supervisory Control & data Acquisation) PPT
SCADA (Supervisory Control & data Acquisation) PPTSCADA (Supervisory Control & data Acquisation) PPT
SCADA (Supervisory Control & data Acquisation) PPTDeepeshK4
 
Rubén Santamarta - SCADA Trojans: Attacking the Grid [Rooted CON 2011]
Rubén Santamarta - SCADA Trojans: Attacking the Grid [Rooted CON 2011]Rubén Santamarta - SCADA Trojans: Attacking the Grid [Rooted CON 2011]
Rubén Santamarta - SCADA Trojans: Attacking the Grid [Rooted CON 2011]RootedCON
 
Practical DNP3 and Modern SCADA Systems
Practical DNP3 and Modern SCADA SystemsPractical DNP3 and Modern SCADA Systems
Practical DNP3 and Modern SCADA SystemsLiving Online
 
"Man-in-the-SCADA": Anatomy of Data Integrity Attacks in Industrial Control S...
"Man-in-the-SCADA": Anatomy of Data Integrity Attacks in Industrial Control S..."Man-in-the-SCADA": Anatomy of Data Integrity Attacks in Industrial Control S...
"Man-in-the-SCADA": Anatomy of Data Integrity Attacks in Industrial Control S...Marina Krotofil
 

What's hot (20)

Industrial protocols for pentesters
Industrial protocols for pentestersIndustrial protocols for pentesters
Industrial protocols for pentesters
 
Security testing in critical systems
Security testing in critical systemsSecurity testing in critical systems
Security testing in critical systems
 
Safety vs Security: How to Create Insecure Safety-Critical System
Safety vs Security: How to Create Insecure Safety-Critical SystemSafety vs Security: How to Create Insecure Safety-Critical System
Safety vs Security: How to Create Insecure Safety-Critical System
 
Industrial protocols for pentesters
Industrial protocols for pentestersIndustrial protocols for pentesters
Industrial protocols for pentesters
 
SCADA deep inside:protocols and software architecture
SCADA deep inside:protocols and software architectureSCADA deep inside:protocols and software architecture
SCADA deep inside:protocols and software architecture
 
scada systems
scada systemsscada systems
scada systems
 
S4x16 europe krotofil_granular_dataflowsics
S4x16 europe krotofil_granular_dataflowsicsS4x16 europe krotofil_granular_dataflowsics
S4x16 europe krotofil_granular_dataflowsics
 
Improving SCADA Security
Improving SCADA SecurityImproving SCADA Security
Improving SCADA Security
 
ICS/SCADA/PLC Google/Shodanhq Cheat Sheet v2
ICS/SCADA/PLC Google/Shodanhq Cheat Sheet v2ICS/SCADA/PLC Google/Shodanhq Cheat Sheet v2
ICS/SCADA/PLC Google/Shodanhq Cheat Sheet v2
 
Scada Classification By-Rahul Mehra
Scada Classification By-Rahul MehraScada Classification By-Rahul Mehra
Scada Classification By-Rahul Mehra
 
Scada system
Scada systemScada system
Scada system
 
From SCADA to IoT
From SCADA to IoTFrom SCADA to IoT
From SCADA to IoT
 
Introducing scada
Introducing scadaIntroducing scada
Introducing scada
 
SCADA (Supervisory Control & data Acquisation) PPT
SCADA (Supervisory Control & data Acquisation) PPTSCADA (Supervisory Control & data Acquisation) PPT
SCADA (Supervisory Control & data Acquisation) PPT
 
SCADA
SCADASCADA
SCADA
 
Rubén Santamarta - SCADA Trojans: Attacking the Grid [Rooted CON 2011]
Rubén Santamarta - SCADA Trojans: Attacking the Grid [Rooted CON 2011]Rubén Santamarta - SCADA Trojans: Attacking the Grid [Rooted CON 2011]
Rubén Santamarta - SCADA Trojans: Attacking the Grid [Rooted CON 2011]
 
Practical DNP3 and Modern SCADA Systems
Practical DNP3 and Modern SCADA SystemsPractical DNP3 and Modern SCADA Systems
Practical DNP3 and Modern SCADA Systems
 
SCADA
SCADASCADA
SCADA
 
"Man-in-the-SCADA": Anatomy of Data Integrity Attacks in Industrial Control S...
"Man-in-the-SCADA": Anatomy of Data Integrity Attacks in Industrial Control S..."Man-in-the-SCADA": Anatomy of Data Integrity Attacks in Industrial Control S...
"Man-in-the-SCADA": Anatomy of Data Integrity Attacks in Industrial Control S...
 
Scada
ScadaScada
Scada
 

Similar to SCADACSSCADACS: Finding and Analyzing Industrial Control Systems on the Internet

SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonPatricia M Watson
 
Plc Scada Software - Centum Controls
Plc Scada Software - Centum ControlsPlc Scada Software - Centum Controls
Plc Scada Software - Centum ControlsCentum Controls
 
Confidence 2017: SCADA and mobile in the IoT times (Ivan Yushkievich, Alexand...
Confidence 2017: SCADA and mobile in the IoT times (Ivan Yushkievich, Alexand...Confidence 2017: SCADA and mobile in the IoT times (Ivan Yushkievich, Alexand...
Confidence 2017: SCADA and mobile in the IoT times (Ivan Yushkievich, Alexand...PROIDEA
 
Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks
 
Cloud assisted io t-based scada systems security- a review of the state of th...
Cloud assisted io t-based scada systems security- a review of the state of th...Cloud assisted io t-based scada systems security- a review of the state of th...
Cloud assisted io t-based scada systems security- a review of the state of th...redpel dot com
 
Sci scada toolbox
Sci scada toolboxSci scada toolbox
Sci scada toolboxAwesomejk
 
[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber Security[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber SecurityOWASP EEE
 
David Blanco ISHM 8280-2016
David Blanco ISHM 8280-2016David Blanco ISHM 8280-2016
David Blanco ISHM 8280-2016David Blanco
 
"Designing Secure Infrastructure for High Growth Product" by Rendra Perdana (...
"Designing Secure Infrastructure for High Growth Product" by Rendra Perdana (..."Designing Secure Infrastructure for High Growth Product" by Rendra Perdana (...
"Designing Secure Infrastructure for High Growth Product" by Rendra Perdana (...Tech in Asia ID
 
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...PECB
 
B-Scada (Beyond SCADA)
B-Scada (Beyond SCADA)B-Scada (Beyond SCADA)
B-Scada (Beyond SCADA)B-Scada, Inc.
 
IJSRED-V2I2P15
IJSRED-V2I2P15IJSRED-V2I2P15
IJSRED-V2I2P15IJSRED
 
Practical analysis of the cybersecurity of European smart grids
Practical analysis of the cybersecurity of European smart gridsPractical analysis of the cybersecurity of European smart grids
Practical analysis of the cybersecurity of European smart gridsSergey Gordeychik
 
Splunk App for Stream - Einblicke in Ihren Netzwerkverkehr
Splunk App for Stream - Einblicke in Ihren NetzwerkverkehrSplunk App for Stream - Einblicke in Ihren Netzwerkverkehr
Splunk App for Stream - Einblicke in Ihren NetzwerkverkehrGeorg Knon
 
Securing Critical Iot Infrastructure, IoT Israel 2014
Securing Critical Iot Infrastructure, IoT Israel 2014Securing Critical Iot Infrastructure, IoT Israel 2014
Securing Critical Iot Infrastructure, IoT Israel 2014iotisrael
 

Similar to SCADACSSCADACS: Finding and Analyzing Industrial Control Systems on the Internet (20)

Securing SCADA
Securing SCADA Securing SCADA
Securing SCADA
 
Securing SCADA
Securing SCADASecuring SCADA
Securing SCADA
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
 
Plc Scada Software - Centum Controls
Plc Scada Software - Centum ControlsPlc Scada Software - Centum Controls
Plc Scada Software - Centum Controls
 
Confidence 2017: SCADA and mobile in the IoT times (Ivan Yushkievich, Alexand...
Confidence 2017: SCADA and mobile in the IoT times (Ivan Yushkievich, Alexand...Confidence 2017: SCADA and mobile in the IoT times (Ivan Yushkievich, Alexand...
Confidence 2017: SCADA and mobile in the IoT times (Ivan Yushkievich, Alexand...
 
Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company Introduction
 
chile-2015 (2)
chile-2015 (2)chile-2015 (2)
chile-2015 (2)
 
Cloud assisted io t-based scada systems security- a review of the state of th...
Cloud assisted io t-based scada systems security- a review of the state of th...Cloud assisted io t-based scada systems security- a review of the state of th...
Cloud assisted io t-based scada systems security- a review of the state of th...
 
Sci scada toolbox
Sci scada toolboxSci scada toolbox
Sci scada toolbox
 
[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber Security[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber Security
 
David Blanco ISHM 8280-2016
David Blanco ISHM 8280-2016David Blanco ISHM 8280-2016
David Blanco ISHM 8280-2016
 
"Designing Secure Infrastructure for High Growth Product" by Rendra Perdana (...
"Designing Secure Infrastructure for High Growth Product" by Rendra Perdana (..."Designing Secure Infrastructure for High Growth Product" by Rendra Perdana (...
"Designing Secure Infrastructure for High Growth Product" by Rendra Perdana (...
 
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
 
B-Scada (Beyond SCADA)
B-Scada (Beyond SCADA)B-Scada (Beyond SCADA)
B-Scada (Beyond SCADA)
 
About b scada
About b scadaAbout b scada
About b scada
 
IJSRED-V2I2P15
IJSRED-V2I2P15IJSRED-V2I2P15
IJSRED-V2I2P15
 
IoT-01-00005-v2.pdf
IoT-01-00005-v2.pdfIoT-01-00005-v2.pdf
IoT-01-00005-v2.pdf
 
Practical analysis of the cybersecurity of European smart grids
Practical analysis of the cybersecurity of European smart gridsPractical analysis of the cybersecurity of European smart grids
Practical analysis of the cybersecurity of European smart grids
 
Splunk App for Stream - Einblicke in Ihren Netzwerkverkehr
Splunk App for Stream - Einblicke in Ihren NetzwerkverkehrSplunk App for Stream - Einblicke in Ihren Netzwerkverkehr
Splunk App for Stream - Einblicke in Ihren Netzwerkverkehr
 
Securing Critical Iot Infrastructure, IoT Israel 2014
Securing Critical Iot Infrastructure, IoT Israel 2014Securing Critical Iot Infrastructure, IoT Israel 2014
Securing Critical Iot Infrastructure, IoT Israel 2014
 

More from Positive Hack Days

Инструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release NotesИнструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release NotesPositive Hack Days
 
Как мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows DockerКак мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows DockerPositive Hack Days
 
Типовая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive TechnologiesТиповая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive TechnologiesPositive Hack Days
 
Аналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + QlikАналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + QlikPositive Hack Days
 
Использование анализатора кода SonarQube
Использование анализатора кода SonarQubeИспользование анализатора кода SonarQube
Использование анализатора кода SonarQubePositive Hack Days
 
Развитие сообщества Open DevOps Community
Развитие сообщества Open DevOps CommunityРазвитие сообщества Open DevOps Community
Развитие сообщества Open DevOps CommunityPositive Hack Days
 
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...Positive Hack Days
 
Автоматизация построения правил для Approof
Автоматизация построения правил для ApproofАвтоматизация построения правил для Approof
Автоматизация построения правил для ApproofPositive Hack Days
 
Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»Positive Hack Days
 
Формальные методы защиты приложений
Формальные методы защиты приложенийФормальные методы защиты приложений
Формальные методы защиты приложенийPositive Hack Days
 
Эвристические методы защиты приложений
Эвристические методы защиты приложенийЭвристические методы защиты приложений
Эвристические методы защиты приложенийPositive Hack Days
 
Теоретические основы Application Security
Теоретические основы Application SecurityТеоретические основы Application Security
Теоретические основы Application SecurityPositive Hack Days
 
От экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 летОт экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 летPositive Hack Days
 
Уязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на граблиУязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на граблиPositive Hack Days
 
Требования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПОТребования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПОPositive Hack Days
 
Формальная верификация кода на языке Си
Формальная верификация кода на языке СиФормальная верификация кода на языке Си
Формальная верификация кода на языке СиPositive Hack Days
 
Механизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET CoreМеханизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET CorePositive Hack Days
 
SOC для КИИ: израильский опыт
SOC для КИИ: израильский опытSOC для КИИ: израильский опыт
SOC для КИИ: израильский опытPositive Hack Days
 
Honeywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services CenterHoneywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services CenterPositive Hack Days
 
Credential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атакиCredential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атакиPositive Hack Days
 

More from Positive Hack Days (20)

Инструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release NotesИнструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release Notes
 
Как мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows DockerКак мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows Docker
 
Типовая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive TechnologiesТиповая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive Technologies
 
Аналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + QlikАналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + Qlik
 
Использование анализатора кода SonarQube
Использование анализатора кода SonarQubeИспользование анализатора кода SonarQube
Использование анализатора кода SonarQube
 
Развитие сообщества Open DevOps Community
Развитие сообщества Open DevOps CommunityРазвитие сообщества Open DevOps Community
Развитие сообщества Open DevOps Community
 
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
 
Автоматизация построения правил для Approof
Автоматизация построения правил для ApproofАвтоматизация построения правил для Approof
Автоматизация построения правил для Approof
 
Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»
 
Формальные методы защиты приложений
Формальные методы защиты приложенийФормальные методы защиты приложений
Формальные методы защиты приложений
 
Эвристические методы защиты приложений
Эвристические методы защиты приложенийЭвристические методы защиты приложений
Эвристические методы защиты приложений
 
Теоретические основы Application Security
Теоретические основы Application SecurityТеоретические основы Application Security
Теоретические основы Application Security
 
От экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 летОт экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 лет
 
Уязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на граблиУязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на грабли
 
Требования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПОТребования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПО
 
Формальная верификация кода на языке Си
Формальная верификация кода на языке СиФормальная верификация кода на языке Си
Формальная верификация кода на языке Си
 
Механизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET CoreМеханизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET Core
 
SOC для КИИ: израильский опыт
SOC для КИИ: израильский опытSOC для КИИ: израильский опыт
SOC для КИИ: израильский опыт
 
Honeywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services CenterHoneywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services Center
 
Credential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атакиCredential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атаки
 

Recently uploaded

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 

Recently uploaded (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 

SCADACSSCADACS: Finding and Analyzing Industrial Control Systems on the Internet

  • 1. SCADACSSCADACS SCADA & Computer Security Find Them, Bind Them – Industrial Control Systems (ICS) on the Internet Johannes Klick Daniel Marzin Secure Identity Research Group - Freie Universität Berlin PHDays - may 2013 - Moscow Russia
  • 2. Outline Introduction What is a SCADA system? Our playground Exploits on the Internet Start/Stop Exploit How to find ICS on the Internet Industrial Risk Assessment Map - IRAM SCADACS Search Engine - SSE Evaluation of SHODAN (Preview) Outlook Joint Data Integration and Information , SCADACS, ICS on the Internet, PHDays 2013 2
  • 3. Outline Introduction What is a SCADA system? Our playground Exploits on the Internet Start/Stop Exploit How to find ICS on the Internet Industrial Risk Assessment Map - IRAM SCADACS Search Engine - SSE Evaluation of SHODAN (Preview) Outlook Joint Data Integration and Information , SCADACS, ICS on the Internet, PHDays 2013 3
  • 4. Introduction Prof. Dr. Volker Roth Jan-Ole Malchow Mateusz Khalil Philipp Lämmel Sascha Zinke Robert Fehrmann , SCADACS, ICS on the Internet, PHDays 2013 4
  • 5. Introduction Founded October 2012 Testlab Research on Finding ICS on the Internet MC7-Disassembler / binary analysis ICS specific communication protocols Exploits Stay tuned! , SCADACS, ICS on the Internet, PHDays 2013 5
  • 6. Outline Introduction What is a SCADA system? Our playground Exploits on the Internet Start/Stop Exploit How to find ICS on the Internet Industrial Risk Assessment Map - IRAM SCADACS Search Engine - SSE Evaluation of SHODAN (Preview) Outlook Joint Data Integration and Information , SCADACS, ICS on the Internet, PHDays 2013 6
  • 7. What is a SCADA system? SCADA (Supervisory Control And Data Acquisition) Controls and monitors industrial (often critical) processes Common system components Programmable logic controllers (PLCs) Read sensors Control actuators Remote terminal units (RTU) PLC to SCADA bridge Human machine interface (HMI) , SCADACS, ICS on the Internet, PHDays 2013 7
  • 8. Outline Introduction What is a SCADA system? Our playground Exploits on the Internet Start/Stop Exploit How to find ICS on the Internet Industrial Risk Assessment Map - IRAM SCADACS Search Engine - SSE Evaluation of SHODAN (Preview) Outlook Joint Data Integration and Information , SCADACS, ICS on the Internet, PHDays 2013 8
  • 9. Our playground Sponsored by Siemens Simatic S7-300 CPU - 313C 313-5BF03-0ABP Network module - CPC 343 1GX30-0XE0 Industrial grade PLC (midrange) Programmable e.g. with STL Binary language MC7 , SCADACS, ICS on the Internet, PHDays 2013 9
  • 10. Our playground Setup like described in W32.Stuxnet Dossier (Symantec 2010/2011) , SCADACS, ICS on the Internet, PHDays 2013 10
  • 11. Our playground Siemens Simatic S7-1200 CPU - 1200 1212C 212-1BE31-0XB0 GSM Module - CP 1247-7 GPRS HMI - KTP400 Basic color PN Industrial grade PLC (lower end) Programmable e.g. with STL , SCADACS, ICS on the Internet, PHDays 2013 11
  • 12. Outline Introduction What is a SCADA system? Our playground Exploits on the Internet Start/Stop Exploit How to find ICS on the Internet Industrial Risk Assessment Map - IRAM SCADACS Search Engine - SSE Evaluation of SHODAN (Preview) Outlook Joint Data Integration and Information , SCADACS, ICS on the Internet, PHDays 2013 12
  • 13. Exploits on the Internet , SCADACS, ICS on the Internet, PHDays 2013 13
  • 14. Exploits Search tags e.g. simatic Search on one of the following websites cve.mitre.org (Common Vulnerabilities and Exposures) www.osvdb.org (Open Source Vulnerability Database) www.exploit-db.com (Exploit Database) packetstormsecurity.com (Packet Storm Security) www.metasploit.com (Metasploit) , SCADACS, ICS on the Internet, PHDays 2013 14
  • 15. Outline Introduction What is a SCADA system? Our playground Exploits on the Internet Start/Stop Exploit How to find ICS on the Internet Industrial Risk Assessment Map - IRAM SCADACS Search Engine - SSE Evaluation of SHODAN (Preview) Outlook Joint Data Integration and Information , SCADACS, ICS on the Internet, PHDays 2013 15
  • 16. Start/Stop Exploit Example of public available exploit Siemens Simatic S7 300/400 CPU START/STOP Module Metasploit Module Dillon Beresford (Black Hat US 2011) Function Send start command Send a sequence of stop commands Our analysis It works now Identified the packets Removed unnecessary packets (two thirds) , SCADACS, ICS on the Internet, PHDays 2013 16
  • 17. Exploits , SCADACS, ICS on the Internet, PHDays 2013 17
  • 18. Exploits , SCADACS, ICS on the Internet, PHDays 2013 18
  • 19. Exploits Without Metasploit libnodave (libnodave.sourceforge.net) From Zottel (sps-forum.de) Great Work! Programs to demonstrate the functionality Including start/stop tests , SCADACS, ICS on the Internet, PHDays 2013 19
  • 20. Exploits Stop Exploit - Demo / Video , SCADACS, ICS on the Internet, PHDays 2013 20
  • 21. Outline Introduction What is a SCADA system? Our playground Exploits on the Internet Start/Stop Exploit How to find ICS on the Internet Industrial Risk Assessment Map - IRAM SCADACS Search Engine - SSE Evaluation of SHODAN (Preview) Outlook Joint Data Integration and Information , SCADACS, ICS on the Internet, PHDays 2013 21
  • 22. How to find ICS on the Internet , SCADACS, ICS on the Internet, PHDays 2013 22
  • 23. How to find ICS on the Internet SHODAN shodanhq.com Scans for HTTP(S), Telnet, SNMP, FTP and NetBios , SCADACS, ICS on the Internet, PHDays 2013 23
  • 24. How to find ICS on the Internet shodanhq.com Scans for HTTP(S), Telnet, SNMP, FTP and NetBios Oldest results dating back to 2010 , SCADACS, ICS on the Internet, PHDays 2013 23
  • 25. How to find ICS on the Internet shodanhq.com Scans for HTTP(S), Telnet, SNMP, FTP and NetBios Oldest results dating back to 2010 Provides an API and search filters for protocols, dates, etc. , SCADACS, ICS on the Internet, PHDays 2013 23
  • 26. How to find ICS on the Internet Devices found on SHODAN Type Count Human Machine Interface 295 Uninterruptible Power Supply Enterprise-Resource-Planning Supervisory Control and Data Acquisition PLC Network Device Programmable Logic Controller Building Management System The industry and PLC manufacturer claim that ICS are not connected to the Internet! SCADACS, ICS on the Internet, PHDays 2013 24
  • 27. How to find ICS on the Internet Devices found on SHODAN Type Count Human Machine Interface 295 Uninterruptible Power Supply 664 Enterprise-Resource-Planning Supervisory Control and Data Acquisition PLC Network Device Programmable Logic Controller Building Management System The industry and PLC manufacturer claim that ICS are not connected to the Internet! SCADACS, ICS on the Internet, PHDays 2013 24
  • 28. How to find ICS on the Internet Devices found on SHODAN Type Count Human Machine Interface 295 Uninterruptible Power Supply 664 Enterprise-Resource-Planning 1222 Supervisory Control and Data Acquisition PLC Network Device Programmable Logic Controller Building Management System The industry and PLC manufacturer claim that ICS are not connected to the Internet! SCADACS, ICS on the Internet, PHDays 2013 24
  • 29. How to find ICS on the Internet Devices found on SHODAN Type Count Human Machine Interface 295 Uninterruptible Power Supply 664 Enterprise-Resource-Planning 1222 Supervisory Control and Data Acquisition 3258 PLC Network Device Programmable Logic Controller Building Management System The industry and PLC manufacturer claim that ICS are not connected to the Internet! SCADACS, ICS on the Internet, PHDays 2013 24
  • 30. How to find ICS on the Internet Devices found on SHODAN Type Count Human Machine Interface 295 Uninterruptible Power Supply 664 Enterprise-Resource-Planning 1222 Supervisory Control and Data Acquisition 3258 PLC Network Device 9772 Programmable Logic Controller Building Management System The industry and PLC manufacturer claim that ICS are not connected to the Internet! SCADACS, ICS on the Internet, PHDays 2013 24
  • 31. How to find ICS on the Internet Devices found on SHODAN Type Count Human Machine Interface 295 Uninterruptible Power Supply 664 Enterprise-Resource-Planning 1222 Supervisory Control and Data Acquisition 3258 PLC Network Device 9772 Programmable Logic Controller 20501 Building Management System The industry and PLC manufacturer claim that ICS are not connected to the Internet! SCADACS, ICS on the Internet, PHDays 2013 24
  • 32. How to find ICS on the Internet Devices found on SHODAN Type Count Human Machine Interface 295 Uninterruptible Power Supply 664 Enterprise-Resource-Planning 1222 Supervisory Control and Data Acquisition 3258 PLC Network Device 9772 Programmable Logic Controller 20501 Building Management System 47764 The industry and PLC manufacturer claim that ICS are not connected to the Internet! , SCADACS, ICS on the Internet, PHDays 2013 24
  • 33. How to find ICS on the Internet , SCADACS, ICS on the Internet, PHDays 2013 25
  • 34. How to find ICS on the Internet Project SHINE infracritical.org Running since 2012-04-14 SCADACS, ICS on the Internet, PHDays 2013 26
  • 35. How to find ICS on the Internet infracritical.org Running since 2012-04-14 Found over 500,000 ICS related entries on SHODAN (ICS-ALERT-13-016A) SCADACS, ICS on the Internet, PHDays 2013 26
  • 36. How to find ICS on the Internet infracritical.org Running since 2012-04-14 Found over 500,000 ICS related entries on SHODAN (ICS-ALERT-13-016A) U.S. DHS reduced the list to 20,000 devices SCADACS, ICS on the Internet, PHDays 2013 26
  • 37. How to find ICS on the Internet infracritical.org Running since 2012-04-14 Found over 500,000 ICS related entries on SHODAN (ICS-ALERT-13-016A) U.S. DHS reduced the list to 20,000 devices List has since grown to over 800k entries SCADACS, ICS on the Internet, PHDays 2013 26
  • 38. Outline Introduction What is a SCADA system? Our playground Exploits on the Internet Start/Stop Exploit How to find ICS on the Internet Industrial Risk Assessment Map - IRAM SCADACS Search Engine - SSE Evaluation of SHODAN (Preview) Outlook Joint Data Integration and Information , SCADACS, ICS on the Internet, PHDays 2013 27
  • 39. Industrial Risk Assessment Map - IRAM , SCADACS, ICS on the Internet, PHDays 2013 28
  • 40. Industrial Risk Assessment Map - IRAM Data source: SHODAN , SCADACS, ICS on the Internet, PHDays 2013 29
  • 41. Industrial Risk Assessment Map - IRAM Data source: SHODAN 83,541 devices , SCADACS, ICS on the Internet, PHDays 2013 29
  • 42. Industrial Risk Assessment Map - IRAM Data source: SHODAN 83,541 devices 83 SHODAN search terms e.g. SIMATIC SoftPLC Rockwell Automation+1769 i.LON inline+controller , SCADACS, ICS on the Internet, PHDays 2013 29
  • 43. Industrial Risk Assessment Map - IRAM IRAM - 1. DEMO / VIDEO , SCADACS, ICS on the Internet, PHDays 2013 30
  • 44. Outline Introduction What is a SCADA system? Our playground Exploits on the Internet Start/Stop Exploit How to find ICS on the Internet Industrial Risk Assessment Map - IRAM SCADACS Search Engine - SSE Evaluation of SHODAN (Preview) Outlook Joint Data Integration and Information , SCADACS, ICS on the Internet, PHDays 2013 31
  • 45. SCADACS Search Engine - SSE , SCADACS, ICS on the Internet, PHDays 2013 32
  • 46. SCADACS Search Engine - SSE SCADACS Search Engine C implementation using raw sockets , SCADACS, ICS on the Internet, PHDays 2013 33
  • 47. SCADACS Search Engine - SSE SCADACS Search Engine C implementation using raw sockets Currently scanning at 2,500 IP / s ... (possible up to 25,000 IP / s) , SCADACS, ICS on the Internet, PHDays 2013 33
  • 48. SCADACS Search Engine - SSE SCADACS Search Engine C implementation using raw sockets Currently scanning at 2,500 IP / s ... (possible up to 25,000 IP / s) Services: HTTP(S), Telnet, S7com, Modbus, (SNMP) , SCADACS, ICS on the Internet, PHDays 2013 33
  • 49. SCADACS Search Engine - SSE SCADACS Search Engine C implementation using raw sockets Currently scanning at 2,500 IP / s ... (possible up to 25,000 IP / s) Services: HTTP(S), Telnet, S7com, Modbus, (SNMP) Future protocols: BACnet, OPC, SRTP , SCADACS, ICS on the Internet, PHDays 2013 33
  • 50. SCADACS Search Engine - SSE S7 Communication (Siemens PLCs) Proprietary protocol Modbus SCADACS, ICS on the Internet, PHDays 2013 34
  • 51. SCADACS Search Engine - SSE S7 Communication (Siemens PLCs) Proprietary protocol Existing code: libnodave and plcscan Modbus SCADACS, ICS on the Internet, PHDays 2013 34
  • 52. SCADACS Search Engine - SSE S7 Communication (Siemens PLCs) Proprietary protocol Existing code: libnodave and plcscan Modbus Open protocol SCADACS, ICS on the Internet, PHDays 2013 34
  • 53. SCADACS Search Engine - SSE S7 Communication (Siemens PLCs) Proprietary protocol Existing code: libnodave and plcscan Modbus Open protocol Many opensource tools (e.g. plcscan) SCADACS, ICS on the Internet, PHDays 2013 34
  • 54. SCADACS Search Engine - SSE Thanks to SCADA StrangeLove for plcscan tool! , SCADACS, ICS on the Internet, PHDays 2013 35
  • 55. SCADACS Search Engine - SSE First Scan Project - Setup Seeding with 7,000 whois queries on IPs found via SHODAN SCADACS, ICS on the Internet, PHDays 2013 36
  • 56. SCADACS Search Engine - SSE First Scan Project - Setup Seeding with 7,000 whois queries on IPs found via SHODAN 4,213 European IP Blocks SCADACS, ICS on the Internet, PHDays 2013 36
  • 57. SCADACS Search Engine - SSE First Scan Project - Setup Seeding with 7,000 whois queries on IPs found via SHODAN 4,213 European IP Blocks 283 Mio. IPs (6.58% of IPv4 address space) SCADACS, ICS on the Internet, PHDays 2013 36
  • 58. SCADACS Search Engine - SSE First Scan Project - Results (Preview) 10,266 ICS/BMS related answers , SCADACS, ICS on the Internet, PHDays 2013 37
  • 59. SCADACS Search Engine - SSE First Scan Project - Results (Preview) 10,266 ICS/BMS related answers 436 via S7 Communication , SCADACS, ICS on the Internet, PHDays 2013 37
  • 60. SCADACS Search Engine - SSE First Scan Project - Results (Preview) 10,266 ICS/BMS related answers 436 via S7 Communication 2571 via Modbus , SCADACS, ICS on the Internet, PHDays 2013 37
  • 61. SCADACS Search Engine - SSE First Scan Project - Results (Preview) 10,266 ICS/BMS related answers 436 via S7 Communication 2571 via Modbus 602 IP Blocks (Modbus / S7) , SCADACS, ICS on the Internet, PHDays 2013 37
  • 62. SCADACS Search Engine - SSE First Scan Project - Results (Preview) 10,266 ICS/BMS related answers 436 via S7 Communication 2571 via Modbus 602 IP Blocks (Modbus / S7) 132 IP Blocks used for dynamic IPs , SCADACS, ICS on the Internet, PHDays 2013 37
  • 63. SCADACS Search Engine - SSE 6 IP blocks owned by a big manufacturer 6.25% of their IPs are answering to Modbus requests 8 IP blocks owned by critical infrastructure SCADACS, ICS on the Internet, PHDays 2013 38
  • 64. SCADACS Search Engine - SSE 6 IP blocks owned by a big manufacturer 6.25% of their IPs are answering to Modbus requests 8 IP blocks owned by critical infrastructure 16% of their IPs are answering to S7 Communication requests SCADACS, ICS on the Internet, PHDays 2013 38
  • 65. SCADACS Search Engine - SSE IRAM and SSE (green: Modbus, red: S7 communication) , SCADACS, ICS on the Internet, PHDays 2013 39
  • 66. Outline Introduction What is a SCADA system? Our playground Exploits on the Internet Start/Stop Exploit How to find ICS on the Internet Industrial Risk Assessment Map - IRAM SCADACS Search Engine - SSE Evaluation of SHODAN (Preview) Outlook Joint Data Integration and Information , SCADACS, ICS on the Internet, PHDays 2013 40
  • 67. Evaluation of SHODAN (Preview) , SCADACS, ICS on the Internet, PHDays 2013 41
  • 68. Evaluation of SHODAN (Preview) Scan of a SHODAN sample set (7,000 devices) Approx. 15 % of devices found on SHODAN are reachable at a given time , SCADACS, ICS on the Internet, PHDays 2013 42
  • 69. Evaluation of SHODAN (Preview) IPs crawled by SHODAN: Approx. 4,000,000,000 IPs (worldwide) Search time used SCADACS, ICS on the Internet, PHDays 2013 43
  • 70. Evaluation of SHODAN (Preview) IPs crawled by SHODAN: Approx. 4,000,000,000 IPs (worldwide) SSE: 283,000,000 IPs (Europe) Search time used SCADACS, ICS on the Internet, PHDays 2013 43
  • 71. Evaluation of SHODAN (Preview) IPs crawled by SHODAN: Approx. 4,000,000,000 IPs (worldwide) SSE: 283,000,000 IPs (Europe) Search time used SHODAN: 1080 days (~3 years) SCADACS, ICS on the Internet, PHDays 2013 43
  • 72. Evaluation of SHODAN (Preview) IPs crawled by SHODAN: Approx. 4,000,000,000 IPs (worldwide) SSE: 283,000,000 IPs (Europe) Search time used SHODAN: 1080 days (~3 years) SSE: 2 days SCADACS, ICS on the Internet, PHDays 2013 43
  • 73. Evaluation of SHODAN (Preview) S7 devices found SHODAN: 444 Overlap of SHODAN and SSE SCADACS, ICS on the Internet, PHDays 2013 44
  • 74. Evaluation of SHODAN (Preview) S7 devices found SHODAN: 444 SSE: 436 Overlap of SHODAN and SSE SCADACS, ICS on the Internet, PHDays 2013 44
  • 75. Evaluation of SHODAN (Preview) S7 devices found SHODAN: 444 SSE: 436 Overlap of SHODAN and SSE 125 S7 devices ~28% SCADACS, ICS on the Internet, PHDays 2013 44
  • 76. Outline Introduction What is a SCADA system? Our playground Exploits on the Internet Start/Stop Exploit How to find ICS on the Internet Industrial Risk Assessment Map - IRAM SCADACS Search Engine - SSE Evaluation of SHODAN (Preview) Outlook Joint Data Integration and Information , SCADACS, ICS on the Internet, PHDays 2013 45
  • 77. Outlook , SCADACS, ICS on the Internet, PHDays 2013 46
  • 78. Outline Introduction What is a SCADA system? Our playground Exploits on the Internet Start/Stop Exploit How to find ICS on the Internet Industrial Risk Assessment Map - IRAM SCADACS Search Engine - SSE Evaluation of SHODAN (Preview) Outlook Joint Data Integration and Information , SCADACS, ICS on the Internet, PHDays 2013 47
  • 79. Joint Data Integration and Information Combine the presented results into one tool Industrial Risk Assessment Map - IRAM What do we get? , SCADACS, ICS on the Internet, PHDays 2013 48
  • 80. Joint Data Integration and Information Combine the presented results into one tool Industrial Risk Assessment Map - IRAM SCADACS Search Engine - SSE What do we get? , SCADACS, ICS on the Internet, PHDays 2013 48
  • 81. Joint Data Integration and Information Combine the presented results into one tool Industrial Risk Assessment Map - IRAM SCADACS Search Engine - SSE Exploits What do we get? , SCADACS, ICS on the Internet, PHDays 2013 48
  • 82. Joint Data Integration and Information Easy to use point and click interface What could it look like? SCADACS, ICS on the Internet, PHDays 2013 49
  • 83. Joint Data Integration and Information Easy to use point and click interface Sophisticated target selection (per country, owner, device type, etc.) What could it look like? SCADACS, ICS on the Internet, PHDays 2013 49
  • 84. Joint Data Integration and Information Easy to use point and click interface Sophisticated target selection (per country, owner, device type, etc.) Integrated vulnerability and exploit database What could it look like? SCADACS, ICS on the Internet, PHDays 2013 49
  • 85. Joint Data Integration and Information Easy to use point and click interface Sophisticated target selection (per country, owner, device type, etc.) Integrated vulnerability and exploit database Direct access to network informations (ping, whois, reverse DNS) What could it look like? SCADACS, ICS on the Internet, PHDays 2013 49
  • 86. Joint Data Integration and Information Easy to use point and click interface Sophisticated target selection (per country, owner, device type, etc.) Integrated vulnerability and exploit database Direct access to network informations (ping, whois, reverse DNS) Seamless integration of further data sources What could it look like? SCADACS, ICS on the Internet, PHDays 2013 49
  • 87. Joint Data Integration and Information Easy to use point and click interface Sophisticated target selection (per country, owner, device type, etc.) Integrated vulnerability and exploit database Direct access to network informations (ping, whois, reverse DNS) Seamless integration of further data sources Social networks What could it look like? SCADACS, ICS on the Internet, PHDays 2013 49
  • 88. Joint Data Integration and Information Easy to use point and click interface Sophisticated target selection (per country, owner, device type, etc.) Integrated vulnerability and exploit database Direct access to network informations (ping, whois, reverse DNS) Seamless integration of further data sources Social networks Current geopolitical informations What could it look like? SCADACS, ICS on the Internet, PHDays 2013 49
  • 89. Joint Data Integration and Information Easy to use point and click interface Sophisticated target selection (per country, owner, device type, etc.) Integrated vulnerability and exploit database Direct access to network informations (ping, whois, reverse DNS) Seamless integration of further data sources Social networks Current geopolitical informations Network perimeters What could it look like? SCADACS, ICS on the Internet, PHDays 2013 49
  • 90. Joint Data Integration and Information Easy to use point and click interface Sophisticated target selection (per country, owner, device type, etc.) Integrated vulnerability and exploit database Direct access to network informations (ping, whois, reverse DNS) Seamless integration of further data sources Social networks Current geopolitical informations Network perimeters Flow of IP packets What could it look like? SCADACS, ICS on the Internet, PHDays 2013 49
  • 91. Joint Data Integration and Information Easy to use point and click interface Sophisticated target selection (per country, owner, device type, etc.) Integrated vulnerability and exploit database Direct access to network informations (ping, whois, reverse DNS) Seamless integration of further data sources Social networks Current geopolitical informations Network perimeters Flow of IP packets Direct execution of exploits What could it look like? SCADACS, ICS on the Internet, PHDays 2013 49
  • 92. Joint Data Integration and Information Easy to use point and click interface Sophisticated target selection (per country, owner, device type, etc.) Integrated vulnerability and exploit database Direct access to network informations (ping, whois, reverse DNS) Seamless integration of further data sources Social networks Current geopolitical informations Network perimeters Flow of IP packets Direct execution of exploits Up to your imagination... What could it look like? SCADACS, ICS on the Internet, PHDays 2013 49
  • 93. Joint Data Integration and Information , SCADACS, ICS on the Internet, PHDays 2013 50
  • 94. The End Thank you for your attention. , SCADACS, ICS on the Internet, PHDays 2013 51