SlideShare a Scribd company logo
1 of 38
ICS and Cyber Security
Özkan Erdoğan
About me
12 years of experience in Cyber Security
Cyber Security Consultant
Ddos and Pen Tests
… Now working on ICS Security
@ozkan_erdogan
ozkerd@gmail.com
Agenda
What are Cyber weapons
What is a critical infrastructure
ICS
Cyber weapons on ICS
Protocols
Threats
Attacks and Types of Attacks
Defense principles
Cyber Weapon
Computer code
Aiming Threat or damage
Unlike other codes, might have pyhsical and psychological affects
Low cost- High damage
Target: system, people, country, critical infrastructures
Critical Infrastructure
Energy
Water treatment
Hospitals
Nuclear reactors
Communication lines
Utility
Market: 1 trillion $
7391 cyber attack (a successfull attack could cause in average 1.2 milyon$)
Oil and Gas
Market: 2.4 trillion $
5493 cyber attack (a successfull attack could cause in average 4 milyon$)
Why we use ICS
A brief description:
Converting signals from digital to analog, controlling equipment so they
automatically function to our needs. i.e. in compliance with a logic that we
program.. Example: Robot, valve, engine, generator, A/C,
Example: move a robot arm, turn on/off a water pump or valve, mix chemicals,
flow control, increase/decrease temperature, measuring voltage, pumping oil
and gas etc..
Scada in Enterprise Network
ICS, Scada and PLC Definition
Industrial Control System
HMI
PLC
Scada Security (?)
CIA vs. AIC.
No encryption
No authentication
No authorization
Mostly default passwords
Security through obscurity
So called ‘Air gap’
Rule of ‘no touch’
Cyber weapons targeted ICS
Most destructive: Stuxnet
A virus directly manipulating the process of uranium enrichment by Iran.
50 malwares targeting only Energy companies- Fireeye.
Havex/ Dragonfly: TCP ports 44818 (Omron, Rockwell Automation), 102 (Siemens) and 502 (Schneider Electric)
Flame: Cyber espionage (20 times bigger than Havex
BlackEnergy: Variants Targeting critical infrastructure
Threat potential
Obama: Nuclear weapon result is either 0 or 1. However, cyber weapon is in a
spectrum of 0-1 and you never know what its gonna cause.
John Kerry: 21.century version of nuclear attacks
Fenghui: Internet , if not controlled, could cause harm more than nuclears do.
Aurora
Aurora Project: 2007.
Scada architecture
Technics:
Many different vendors, protocols and processes.
Need to get over against air-gap
Convergence of OT to IT, protocols using TCP/IP
Patch and upgrade almost impossible (locking, restart issues)
An ad
xxxx Bina Otomasyon Sistemi’nin mimarisi, programlanabilir kontrol ünitelerinden
ve farklı nokta tip ve kapasitelerine sahip I/O üniteleri ile HMI (Dokunmatik Ekran)
ünitelerinden oluşmaktadır. xxxxx en nemli özelliği, kontrol ünitelerinin doğrudan
TCP-IP protokolü ile Ethernet’e çıkabilmesi, ftp ve web server özellikleriyle de
INTERNET üzerinden sisteme erişim imkanı verebilmesidir. Bu sayede kullanıcılar
uzaktan her hangi bir özel yazılıma ihtiyaç duymadan, web browser ile sistemle
ilgili değerleri izleyebilmekte ve set değerlerini değiştirebilmektedirler.
xxxx Manager yazılımı kullanılarak, lokal veya uzaktan hatta internet bağlantısı
ile kontrol ünitelerine bağlanıp, programlama yapmak mümkün olmaktadır
Scada Manufacturers
Siemens.
Honeywell.
Tecnomatix (USDATA)
ABB
Tibbo Systems (AggreGate SCADA/HMI)
Schneider Electric (Wonderware, Televent Citect)
Survalent Technology Company (STC)
Rockwell
Scada /ICS protocols
Modbus (Both way traffic, read/write, usually uses TCP/IP with single layer)
Profinet
DNP (Both way traffic, read/write, usually uses TCP/IP with single layer)
Siemens S7
IEC 60870
ICS-Attack Vectors
Information Gathering
Scan (nmap, plcscan)
Arp poisoning
Traffic Capture/Replay
Exploit (Nessus plugins and Metasploit modules)
Brute force
Information Gathering
Shodan, censys
Nmap
PLCScan
Masscan
Google hacking
Cont’d
● Nmap, plcscan
● Rule 1: Be gentle
● Nmap -scan-delay=1 (-n omits dns) (Digital Bond has nmap specific scripts)
● Do a tcp scan instead of syn (Don’t use half open)
● Do not use fingerprinting
● Do not use -Sc (scripting)
● Do not use udp scan
● Snmpcheck -t IP
Gives you
● Open udp, tcp ports
● Service details
● Python plcscan.py IP (Scans port 102 and 502)
ICS on Internet
Shodan findings
Siemens S7- 100 x 102.port
DNP: 20 xport:20000
Modbus: 338 x port:502
IEC 60870: 38 x port: 2404
Google dork
Physical Attacks
Physical attacks against
PLC
RTU -
Smart meter
Relays
Circuit breakers
.
Black box attacks
Web and ftp servers, field devices
Web based attacks
SQL injection
Privilege escalation
Trojan, Backdoor
Ddos
Internal attacks
Traffic capture and replay
Man in the middle
Arp poisoning
Nessus (Scada Policy & Credential Check)
Metasploit
Wireshark
Python
Defense
Patch management
DPI ?
Data diodes ?
Nw segmentation-Isolation
Awareness
Incident Response
Fuzzers
Commercial
Codemicon
Wurdtech Achilles
peachfuzzer.com
Open:
Aegis ( https://www.automatak.com/aegis/)
Modbus - tcp
Encryption: None
Authentication: None
Modbus Protocol Fields
Modbus request packet
Modbus Case study
PLC Simulator (Modbus PAL) and mbtget
https://youtu.be/jxJ6921qrpE
Exploit via Metasploit
https://youtu.be/1bCrCFqgP-M
Tampering via Mbtget
https://youtu.be/mGixseMvaMM
Vulnerabilities
...and counting!!
Case Study: Ukraine power outage
Exploitation Tools
or buy from
Agora Scada +
‘Made in Russia’
The End-
Thank you...
Questions?

More Related Content

Recently uploaded

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Recently uploaded (20)

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 

Featured

Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

Featured (20)

Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 

Industrial Control Systems (ICS) and Cyber Security

  • 1. ICS and Cyber Security Özkan Erdoğan
  • 2. About me 12 years of experience in Cyber Security Cyber Security Consultant Ddos and Pen Tests … Now working on ICS Security @ozkan_erdogan ozkerd@gmail.com
  • 3. Agenda What are Cyber weapons What is a critical infrastructure ICS Cyber weapons on ICS Protocols Threats Attacks and Types of Attacks Defense principles
  • 4. Cyber Weapon Computer code Aiming Threat or damage Unlike other codes, might have pyhsical and psychological affects Low cost- High damage Target: system, people, country, critical infrastructures
  • 6. Utility Market: 1 trillion $ 7391 cyber attack (a successfull attack could cause in average 1.2 milyon$) Oil and Gas Market: 2.4 trillion $ 5493 cyber attack (a successfull attack could cause in average 4 milyon$)
  • 7. Why we use ICS A brief description: Converting signals from digital to analog, controlling equipment so they automatically function to our needs. i.e. in compliance with a logic that we program.. Example: Robot, valve, engine, generator, A/C, Example: move a robot arm, turn on/off a water pump or valve, mix chemicals, flow control, increase/decrease temperature, measuring voltage, pumping oil and gas etc..
  • 9. ICS, Scada and PLC Definition Industrial Control System
  • 10. HMI
  • 11. PLC
  • 12. Scada Security (?) CIA vs. AIC. No encryption No authentication No authorization Mostly default passwords Security through obscurity So called ‘Air gap’ Rule of ‘no touch’
  • 13. Cyber weapons targeted ICS Most destructive: Stuxnet A virus directly manipulating the process of uranium enrichment by Iran. 50 malwares targeting only Energy companies- Fireeye. Havex/ Dragonfly: TCP ports 44818 (Omron, Rockwell Automation), 102 (Siemens) and 502 (Schneider Electric) Flame: Cyber espionage (20 times bigger than Havex BlackEnergy: Variants Targeting critical infrastructure
  • 14. Threat potential Obama: Nuclear weapon result is either 0 or 1. However, cyber weapon is in a spectrum of 0-1 and you never know what its gonna cause. John Kerry: 21.century version of nuclear attacks Fenghui: Internet , if not controlled, could cause harm more than nuclears do.
  • 16. Scada architecture Technics: Many different vendors, protocols and processes. Need to get over against air-gap Convergence of OT to IT, protocols using TCP/IP Patch and upgrade almost impossible (locking, restart issues)
  • 17. An ad xxxx Bina Otomasyon Sistemi’nin mimarisi, programlanabilir kontrol ünitelerinden ve farklı nokta tip ve kapasitelerine sahip I/O üniteleri ile HMI (Dokunmatik Ekran) ünitelerinden oluşmaktadır. xxxxx en nemli özelliği, kontrol ünitelerinin doğrudan TCP-IP protokolü ile Ethernet’e çıkabilmesi, ftp ve web server özellikleriyle de INTERNET üzerinden sisteme erişim imkanı verebilmesidir. Bu sayede kullanıcılar uzaktan her hangi bir özel yazılıma ihtiyaç duymadan, web browser ile sistemle ilgili değerleri izleyebilmekte ve set değerlerini değiştirebilmektedirler. xxxx Manager yazılımı kullanılarak, lokal veya uzaktan hatta internet bağlantısı ile kontrol ünitelerine bağlanıp, programlama yapmak mümkün olmaktadır
  • 18. Scada Manufacturers Siemens. Honeywell. Tecnomatix (USDATA) ABB Tibbo Systems (AggreGate SCADA/HMI) Schneider Electric (Wonderware, Televent Citect) Survalent Technology Company (STC) Rockwell
  • 19. Scada /ICS protocols Modbus (Both way traffic, read/write, usually uses TCP/IP with single layer) Profinet DNP (Both way traffic, read/write, usually uses TCP/IP with single layer) Siemens S7 IEC 60870
  • 20. ICS-Attack Vectors Information Gathering Scan (nmap, plcscan) Arp poisoning Traffic Capture/Replay Exploit (Nessus plugins and Metasploit modules) Brute force
  • 22. Cont’d ● Nmap, plcscan ● Rule 1: Be gentle ● Nmap -scan-delay=1 (-n omits dns) (Digital Bond has nmap specific scripts) ● Do a tcp scan instead of syn (Don’t use half open) ● Do not use fingerprinting ● Do not use -Sc (scripting) ● Do not use udp scan ● Snmpcheck -t IP Gives you ● Open udp, tcp ports ● Service details ● Python plcscan.py IP (Scans port 102 and 502)
  • 24. Shodan findings Siemens S7- 100 x 102.port DNP: 20 xport:20000 Modbus: 338 x port:502 IEC 60870: 38 x port: 2404
  • 26. Physical Attacks Physical attacks against PLC RTU - Smart meter Relays Circuit breakers .
  • 27. Black box attacks Web and ftp servers, field devices Web based attacks SQL injection Privilege escalation Trojan, Backdoor Ddos
  • 28. Internal attacks Traffic capture and replay Man in the middle Arp poisoning Nessus (Scada Policy & Credential Check) Metasploit Wireshark Python
  • 29. Defense Patch management DPI ? Data diodes ? Nw segmentation-Isolation Awareness Incident Response
  • 31. Modbus - tcp Encryption: None Authentication: None
  • 34. Modbus Case study PLC Simulator (Modbus PAL) and mbtget https://youtu.be/jxJ6921qrpE Exploit via Metasploit https://youtu.be/1bCrCFqgP-M Tampering via Mbtget https://youtu.be/mGixseMvaMM
  • 36. Case Study: Ukraine power outage
  • 37. Exploitation Tools or buy from Agora Scada + ‘Made in Russia’