This document summarizes an presentation on industrial protocols for pentesters. It discusses several common industrial protocols including Modbus, Siemens S7, PROFINET, and provides information on analyzing them such as looking for patterns in hex dumps. Specific exploitation techniques are mentioned such as extracting password hashes from TIA Portal project files or intercepting S7 authentication challenges and responses. The presenters provide resources for further information on industrial control systems and security.