Exploiting controls systems demonstration using Shodan, DB Exploit, Google Hacking, Diggity, Kali Linux
|
|
|
- Marian Reynolds
- 10 years ago
- Views:
Transcription
1 Exploiting controls systems demonstration using Shodan, DB Exploit, Google Hacking, Diggity, Kali Linux Michael Chipley, PhD GICSP PMP LEED AP President March 24, 2015
2 Control Systems Definitions Industrial Control Systems (ICS) are physical equipment oriented technologies and systems that deal with the actual running of plants and equipment, include devices that ensure physical system integrity and meet technical constraints, and are event-driven and frequently realtime software applications or devices with embedded software. These types of specialized systems are pervasive throughout the infrastructure and are required to meet numerous and often conflicting safety, performance, security, reliability, and operational requirements. ICSs include Building Automation Systems (BAS), Building Management Systems (BMS), Energy Management Systems (EMS), Emergency Management Information Systems (EMIS), and Electronic Security Systems (ESS). Within the controls systems industry, ICS systems are often referred to as Operational Technology (OT) systems. Emerging Terms: Cyber-Physical Systems (CPS), Resilient Interdependent Infrastructure Processes and Systems (RIPS)
3 Types of Building Control Systems Advanced Metering Infrastructure Building Automation System Building Management Control System CCTV Surveillance System CO2 Monitoring Digital Signage Systems Electronic Security System Emergency Management System Energy Management System Exterior Lighting Control Systems Fire Alarm System Fire Sprinkler System Interior Lighting Control System Intrusion Detection Systems Physical Access Control System Public Safety/Land Mobile Radios Renewable Energy Geothermal Systems Renewable Energy Photo Voltaic Systems Shade Control System Smoke and Purge Systems Vertical Transport System (Elevators and Escalators) Smart High-Performance Green Buildings are highly integrated / interconnected
4 Johnson Controls Architecture
5 TridiumArchitecture
6 System & Terminal Unit Controllers, Actuators JACE Field Server ilon Smart Server VAV L-switch BAS Remote Server Valve Actuator Valve Actuator Pressure Sensor Temperature Sensor Analog voltage, resistance, current signal is converted to digital, then IP
7 ICS Protocols Internet Protocols IPv4 and IPv6 Transmission Control Protocol (TCP) User Datagram Protocol (UDP) Hypertext Transfer Protocol (HTTP) - Port 80 Hypertext Transfer Protocol Secure (HTTPS) -Port 443 Open Control Systems Protocols Modbus: Master/Slave - Port 502 BACnet: Master/Slave - Port LonWorks/LonTalk: Peer to Peer - Port 1679 DNP3: Master/Slave - Port IEEE 802.x -Peer to Peer Zigbee-Peer to Peer Bluetooth Master/Slave Proprietary Control Systems Protocols Tridium NiagraAX/Fox Johnson Metasys N2 OSISoft Pi System Many others
8 Building Control System Protocols Control systems are fundamentally different than IT Can be based on Master and Slaves or Peer to Peer Slaves have Registers and Coils Devices use several different programming languages to perform operations Not originally designed for security or encryption Master = Client : sends requests for values in the address Slave = Server : replies with data Registers and Coils = memory locations Typical file extensions: *.ACD *.CXP *.ESD *.ESX *.LDA *.LCD *.LDO *.LCX *.plcproject *.PRJ *.PRT *.RSP *.QXD *.SCD
9 Typical Modbus Architecture
10 Typical BACnetArchitecture
11 Continuous Monitoring and Attack Surfaces Host Based Security Systems Scanning (Active) Windows, Linux HTTP, TCP, UDP McAfee Nessus Retina Client Side Attacks Server Side Attacks Intrusion Detection Systems (Passive) PLC, RTU, Sensor Modbus, LonTalk, BACnet, DNP3 Nessus Passive Vulnerability Scanner Sophia Grass Marlin Others? Network Attacks Hardware Attacks
12 Tools Information Gathering Google Search and Hacking Google Earth The Harvester Recon-NG Shodan Costar Network Discovery & Monitoring Nmap Snort Kismet Nessus McAfee Sophia Bandolier Attack and Defend Tools Kali Linux (Backtrack) SamuraiSTFU Wireshark Gleg Windows PowerShell Windows Management Information Console Windows Enhanced Mitigation Tools Windows Sysinternals Assessment Tools DHS ICS-CERT Cyber Security Evaluation Tool (CSET) Virtual Machines VM Player Windows Hypervisor
13 Google Hacking
14 Google Hacking filetype:pdf-site:tridium.com site:mil 05N R-4002_Part_3_Draft.pdf
15 Google Hacking DiggityProject
16 Google Hacking DiggityProject...level the playing field find information disclosures and exposed vulnerabilities before others do
17 Google Earth Almost every community has downloadable.kmz files of infrastructure
18 BING Bird s Eye provides high resolution 3d imagery
19 GSA Smart Buildings Sources Sought (1) Google Street View provides very high resolution imagery of building & surrounds
20 Shodan Shodan is to OT IP addresses as is Google is to text search
21 Google Hacking-Database
22 Google Hacking DB Search Honeywell results
23 Shodan TridiumSearch Direct Internet connected HMI
24 DistechControls
25 Shodan DistechSearch HTTP/ Unauthorized WWW-Authenticate: Digest realm="niagara-admin", qop="auth", algorithm="md5", nonce="uvdrawnmndawnje1odc4nzbhytc5njmyyzlkytk3ntg1zdqy" Content-Length: 56 Content-Type: text/html Niagara-Platform: QNX Niagara-Started: Baja-Station-Brand: distech Niagara-HostId: Qnx-NPM EA-FDCC Server: Niagara Web Server/3.0 Attacker has most of the information needed to exploit
26 Kali Linux
27 Kali Menu Many exploitation tools
28 Target Sequence Target 1 Corporate DMZ Web Server, php exploit, use Meterpreter Target 2 File Server, psexec Pass-the Hash exploit, use Meterpreter Target 3 MS Domain Controller, nbtstat, netsh to create Beacon, use Meterpreter Target 4 ICS/BAS, Modbus exploit, locate devices
29 Target 4 (ICS/BAS) Attacker has now identified the number of Modbus devices on the network.
30 SamuraiSTFUApplications Embedded Electronics Field Technician Interfaces RF Communications Network Protocols User Interfaces
31 Launch mbtget Modbus Command Line Mbtget: universal Modbus read/write, no authentication required
32 Mbtget Change Registers and Coils ModbusPalRegister and Coil values have been overwritten by mbtget. Attacker uses vendor product, install instructions to identify initial settings, then alter them. No error codes show up to alert operator a system parameter has been changed, but High Voltage Alarm would be triggered, unless attacker also changed the Alarm value..
33 Wireshark Home Start and observe packets being captured Sample Captures (pcap) Wireshark is the world's foremost network protocol analyzer. It lets you see what's happening on your network at a microscopic level.
34 Wireshark Modbus Captures Modbus Passive method to collect ALL IP data traversing, wired and wireless
Cybersecurity of Buildings Workshop OT and IT Convergence A New Paradigm. Marriott Wardman Park January 6, 2014
Cybersecurity of Buildings Workshop OT and IT Convergence A New Paradigm Marriott Wardman Park January 6, 2014 1 Agenda Overview of Building Control Systems and Cybersecurity Efforts Cybersecurity Initiatives
Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya [email protected]
Internet of things (IOT) applications covering industrial domain Dev Bhattacharya [email protected] Outline Internet of things What is Internet of things (IOT) Simplified IOT System Architecture
IDS and Penetration Testing Lab ISA656 (Attacker)
IDS and Penetration Testing Lab ISA656 (Attacker) Ethics Statement Network Security Student Certification and Agreement I,, hereby certify that I read the following: University Policy Number 1301: Responsible
Course Title: Penetration Testing: Security Analysis
Course Title: Penetration Testing: Security Analysis Page 1 of 9 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics in advanced
Tk20 Network Infrastructure
Tk20 Network Infrastructure Tk20 Network Infrastructure Table of Contents Overview... 4 Physical Layout... 4 Air Conditioning:... 4 Backup Power:... 4 Personnel Security:... 4 Fire Prevention and Suppression:...
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323
It's All About HVAC Systems and Saving Big Bucks Using DDC Systems!
Energy-Facilities Connections Conference Leavenworth, Washington It's All About HVAC Systems and Saving Big Bucks Using DDC Systems! May 12 th, 2010 Session 2, 10-11:20 am by Greg Jourdan 1 Agenda-It's
Security Issues with Integrated Smart Buildings
Security Issues with Integrated Smart Buildings Jim Sinopoli, Managing Principal Smart Buildings, LLC The building automation industry is now at a point where we have legitimate and reasonable concern
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)
EC-Net AX Supervisor with 0 Niagara network connections - for. EC-Net AX Supervisor with 100 Niagara network connections. Includes
Datasheet Overview The EC-Net AX building management system (BMS) is a comprehensive Web-based platform powered by the Niagara AX Framework. Its open structure creates a common development and management
Cybersecuring DoD Industrial Control Systems One Year Later.
Cybersecuring DoD Industrial Control Systems One Year Later. Michael Chipley, PhD GICSP PMP LEED AP President February 23, 2015 [email protected] 1 Overview DoD CIO C&A Transformation NIST SP 800-53
Niagara IT Manager s Guide
3951 Westerre Parkway, Suite 350 Richmond, VA 23233 804.747.4771 Phone 804.747.5204 FAX Niagara IT Manager s Guide A White Paper An IT Manager s Guide to Niagara This document addresses some of the common
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities Learning Objectives Name the common categories of vulnerabilities Discuss common system
Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)
Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses
Cyber Threats in Physical Security Understanding and Mitigating the Risk
Cyber Threats in Physical Security Understanding and Mitigating the Risk Synopsis Over the last few years, many industrial control systems, including security solutions, have adopted digital technology.
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION Prepared for the NRC Fuel Cycle Cyber Security Threat Conference Presented by: Jon Chugg, Ken Rohde Organization(s): INL Date: May 30, 2013 Disclaimer
Control System - Enterprise Integration HVAC Concepts, Inc. (2005)
Control System - Enterprise Integration HVAC Concepts, Inc. (2005) What is Control System Enterprise Integration? Control System Enterprise Integration is the presentation of data from multiple types of
SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005
SCADA System Security ECE 478 Network Security Oregon State University March 7, 2005 David Goeke Hai Nguyen Abstract Modern public infrastructure systems
Exploiting Access Control and Facility Management Systems. Billy Rios Director of Threat Intelligence Qualys
Exploiting Access Control and Facility Management Systems Billy Rios Director of Threat Intelligence Qualys About:Me Qualys Director of Vulnerability Research and Threat Intelligence SpearPoint Security
Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.
Securing Modern Substations With an Open Standard Network Security Solution Kevin Leech Schweitzer Engineering Laboratories, Inc. Copyright SEL 2009 What Makes a Cyberattack Unique? While the resources
INFORMATION SECURITY TRAINING CATALOG (2015)
INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2015) Revision 3.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,
Vulnerability Assessment and Penetration Testing
Vulnerability Assessment and Penetration Testing Module 1: Vulnerability Assessment & Penetration Testing: Introduction 1.1 Brief Introduction of Linux 1.2 About Vulnerability Assessment and Penetration
@arnaudsoullie. Windows Active Directory Can a Windows AD be secured? JSSI 2013 (French, sorry) SCADA stuff
Pentesting PLCs 101 Windows Active Directory Can a Windows AD be secured? JSSI 2013 (French, sorry) Senior security auditor SCADA stuff Wine tasting (we re not going to talk about it today) @arnaudsoullie
Build Your Own Security Lab
Build Your Own Security Lab A Field Guide for Network Testing Michael Gregg WILEY Wiley Publishing, Inc. Contents Acknowledgments Introduction XXI xxiii Chapter 1 Hardware and Gear Why Build a Lab? Hackers
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
Penetration Testing with Kali Linux
Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security, 2014 No part of this publication, in whole or
On the use of Honeypots for Detecting Cyber Attacks on Industrial Control Networks
CIBSI 2013 Panama City, Panama, October 30 th, 2013 On the use of Honeypots for Detecting Cyber Attacks on Industrial Control Networks Paulo Simões, Tiago Cruz, Jorge Gomes, Edmundo Monteiro [email protected]
VMware: Advanced Security
VMware: Advanced Security Course Introduction Course Introduction Chapter 01 - Primer and Reaffirming Our Knowledge Primer and Reaffirming Our Knowledge ESX Networking Components How Virtual Ethernet Adapters
Team Members: Jared Romano, Rachael Dinger, Chris Jones, Miles Kelly Supervising Professor: Dr. George Collins Industry Advisor: Dr.
Cyber Security 2014 Team Members: Jared Romano, Rachael Dinger, Chris Jones, Miles Kelly Supervising Professor: Dr. George Collins Industry Advisor: Dr. Joel Dubow Hacking Incidents Reported to the Cyber
IT Security and OT Security. Understanding the Challenges
IT Security and OT Security Understanding the Challenges Security Maturity Evolution in Industrial Control 1950s 5/4/2012 # 2 Technology Sophistication Security Maturity Evolution in Industrial Control
IDS and Penetration Testing Lab ISA 674
IDS and Penetration Testing Lab ISA 674 Ethics Statement Network Security Student Certification and Agreement I,, hereby certify that I read the following: University Policy Number 1301: Responsible Use
Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation... 1. Areas for Improvement... 2
Report No. 13-35 September 27, 2013 Appalachian Regional Commission Table of Contents Results of Evaluation... 1 Areas for Improvement... 2 Area for Improvement 1: The agency should implement ongoing scanning
Basics Value Next Steps
Selling TALK Basics Value Next Steps Basics Value Next Steps Terms The Tridium Niagra JACE Java Application Control Engine Tridium = Company Niagara Framework = Technology JACE Controller = Java application
Configuring an APOGEE System on an IT Infrastructure White Paper
Configuring an APOGEE System on an IT Infrastructure White Paper 149-1006 Building Technologies 149-1006, Rev. DA Copyright Notice Copyright Notice Notice Document information is subject to change without
IBM. Vulnerability scanning and best practices
IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration
Missing the Obvious: Network Security Monitoring for ICS
Missing the Obvious: Network Security Monitoring for ICS If ICS are so vulnerable, why haven t we seen more attacks? We aren t looking! Two Key Reasons Intent Visibility Intent Why are targeted attacks
Networks and Security Lab. Network Forensics
Networks and Security Lab Network Forensics Network Forensics - continued We start off from the previous week s exercises and analyze each trace file in detail. Tools needed: Wireshark and your favorite
CSSIA CompTIA Security+ Domain. Network Security. Network Security. Network Security. Network Security. Network Security
Security+ Supported Labs - V1 Lab 1 Network Devices and Technologies - Capturing Network Using tcpdump to Capture Network with Wireshark with Network Miner 2 Secure Network Administration Principles -
Comprehensive Data Center Energy Management Solutions
FROM INSIGHT TO EFFICIENCY: Comprehensive Data Center Energy Management Solutions Since 1995, facility managers and BAS professionals have relied on the Niagara framework to provide full convergence of
EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp
EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp ECSA/LPT is a security class like no other! Providing real world hands on experience, it is the only in-depth
EC-Council Certified Security Analyst (ECSA)
EC-Council Certified Security Analyst (ECSA) v8 Eğitim Tipi ve Süresi: 5 Days VILT 5 Day VILT EC-Council Certified Security Analyst (ECSA) v8 Learn penetration testing methodologies while preparing for
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)
Network Traffic Analysis
2013 Network Traffic Analysis Gerben Kleijn and Terence Nicholls 6/21/2013 Contents Introduction... 3 Lab 1 - Installing the Operating System (OS)... 3 Lab 2 Working with TCPDump... 4 Lab 3 - Installing
CYBER SECURITY. Novel Approaches for Security in Building Automation Systems. J. Kaur, C. Herdin, J. Tonejc, S. Wendzel, M. Meier, and S.
Novel Approaches for Security in Building Automation Systems J. Kaur, C. Herdin, J. Tonejc, S. Wendzel, M. Meier, and S. Szlósarczyk [email protected] CYBER SECURITY Outline n Building Automation
WISE-4000 Series. WISE IoT Wireless I/O Modules
WISE-4000 Series WISE IoT Wireless I/O Modules Bring Everything into World of the IoT WISE IoT Ethernet I/O Architecture Public Cloud App Big Data New WISE DNA Data Center Smart Configure File-based Cloud
AutoLog ControlMan. Remote Monitoring & Controlling Service
AutoLog 1 AutoLog ControlMan Remote Monitoring & Controlling Service Web browser based HMI / SCADA interface Server is hosted by Internet server hosting company Control units communicate wirelessly via
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Cyber Security Implications of SIS Integration with Control Networks
Cyber Security Implications of SIS Integration with Control Networks The LOGIIC SIS Project Standards Certification Education & Training Publishing Conferences & Exhibits Presenter Zach Tudor is a Program
Introduction to Network Discovery and Identity
The following topics provide an introduction to network discovery and identity policies and data: Host, Application, and User Detection, page 1 Uses for Host, Application, and User Discovery and Identity
securityprobe5es -X20
securityprobe5es -X20 v.100.00x securityprobe5es -X20 will monitor the physical environment and alert you of any disturbances, such as unauthorized intruders, security breaches, high temperatures, smoke,
Automated Vulnerability Scan Results
Automated Vulnerability Scan Results Table of Contents Introduction...2 Executive Summary...3 Possible Vulnerabilities... 7 Host Information... 17 What Next?...20 1 Introduction The 'www.example.com' scan
Cyber Security for NERC CIP Version 5 Compliance
GE Measurement & Control Cyber Security for NERC CIP Version 5 Compliance imagination at work Contents Cyber Security for NERC CIP Compliance... 5 Sabotage Reporting... 6 Security Management Controls...
Holistic View of Industrial Control Cyber Security
Holistic View of Industrial Control Cyber Security A Deep Dive into Fundamentals of Industrial Control Cyber Security Learning Goals o Understanding security implications involving industrial control systems
Federal Facilities Council Workshop: Cyber Resilience of Building Control Systems-----Nov 17-19, 2015-----Washington, DC
Day 1, Nov 17, 2015 8:00 a.m. 9:00 a.m. Check in/setup 9:00 a.m. 9:10 a.m. Welcome and Introductions 9:10 a.m. 9:30 a.m. Federal Perspective Keynote Global/National Landscape: Former Congressman Steve
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
Reclamation Manual Directives and Standards
Vulnerability Assessment Requirements 1. Introduction. Vulnerability assessment testing is required for all access points into an electronic security perimeter (ESP), all cyber assets within the ESP, and
The Trend Toward Convergence of Physical and Logical (Cyber) Security
The Trend Toward Convergence of Physical and Logical (Cyber) Security Fred S. Roberts Director Command, Control, and Interoperability Center for Advanced Data Analysis (CCICADA)* Rutgers University *A
SECURING THE MOVE TO IP-BASED SCADA/PLC NETWORKS
SECURING THE MOVE TO IP-BASED SCADA/PLC NETWORKS November 2011 Purpose The purpose of this guide is to provide examples/types of SCADA and control systems and their typical use in industry. This document
GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance
GE Oil & Gas Cyber Security for NERC CIP Versions 5 & 6 Compliance Cyber Security for NERC CIP Versions 5 & 6 Compliance 2 Contents Cyber Security for NERC CIP Compliance... 5 Sabotage Reporting... 6 Security
National Endowment for the Arts Evaluation Report. Table of Contents. Results of Evaluation... 1. Areas for Improvement... 2. Exit Conference...
NEA OIG Report No. R-13-03 Table of Contents Results of Evaluation... 1 Areas for Improvement... 2 Area for Improvement 1: The agency should implement ongoing scanning to detect vulnerabilities... 2 Area
Networking Basics and Network Security
Why do we need networks? Networking Basics and Network Security Shared Data and Functions Availability Performance, Load Balancing What is needed for a network? ISO 7-Layer Model Physical Connection Wired:
CompTIA Network+ (Exam N10-005)
CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate
Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr. Compliance Auditor Cyber Security
Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr. Compliance Auditor Cyber Security CIP-005-3 Audit Approach, ESP Diagrams, Industry Best Practices September 24 25, 2013 SALT LAKE CITY, UTAH
Five Steps to Improve Internal Network Security. Chattanooga ISSA
Five Steps to Improve Internal Network Security Chattanooga ISSA 1 Find Me AverageSecurityGuy.info @averagesecguy [email protected] github.com/averagesecurityguy ChattSec.org 2 Why? The methodical
Securely Connect, Network, Access, and Visualize Your Data
Securely Connect, Network, Access, and Visualize Your Data 1 Who is Skkynet? Skkynet is the Parent company of; - Cogent Real-Time Systems Established in 1994 Focus on Industrial Automation software Cogent
Compatible with all of the Ravica range of Intelligent Sensors it provides a complete environmental, access control and security monitoring solution.
Sensor Control... Control... Sensor Control... Access securityprobe 5E Standard securityprobe 5E Standard Monitor the physical environment and receive alerts of any disturbances, such as unauthorized intruders,
Monitoring & Control of Small-scale Renewable Energy Sources
Small Scale Renewable Energy Sources and Energy Saving: 6-17 th July 2009 Monitoring & Control of Small-scale Renewable Energy Sources Dr G A Taylor Brunel Institute of Power Systems Brunel University,
PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access
The Best First for Beginners who want to become Penetration Testers PTSv2 in pills: Self-paced, online, flexible access 900+ interactive slides and 3 hours of video material Interactive and guided learning
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
Wireless Tools. Training materials for wireless trainers
Wireless Tools Training materials for wireless trainers This talk covers tools that will show you a great deal of information about wireless networks, including network discovery, data logging, security
securityprobe 5E Standard
securityprobe 5E Standard securityprobe 5E Standard Monitor the physical environment and receive alerts of any disturbances, such as unauthorized intruders, security breaches, high temperatures, smoke,
Comprehensive Data Center Energy Management Solutions
FROM INSIGHT TO EFFICIENCY: Comprehensive Data Center Energy Management Solutions Since 1995, facility managers and BAS professionals have relied on the Niagara Framework to provide full convergence of
CIT 380: Securing Computer Systems
CIT 380: Securing Computer Systems Scanning CIT 380: Securing Computer Systems Slide #1 Topics 1. Port Scanning 2. Stealth Scanning 3. Version Identification 4. OS Fingerprinting 5. Vulnerability Scanning
Enterprise A Closer Look at Wireless Intrusion Detection:
White Paper Enterprise A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model Josh Wright Senior Security Researcher Introduction As wireless enterprise networks become
Overview. Alarm console supports simultaneous viewing of both live and recorded video when alarm events are selected
Niagara Security Overview Niagara Security by Tridium, is an open, web-based security management solution that allows you to manage and monitor your facility anytime, anywhere. Built on Tridium s Niagara
Information Security. Training
Information Security Training Importance of Information Security Training There is only one way to keep your product plans safe and that is by having a trained, aware and a conscientious workforce. - Kevin
Utility Telecom Forum. Robert Sill, CEO & President Aegis Technologies February 4, 2008
Utility Telecom Forum Robert Sill, CEO & President Aegis Technologies February 4, 2008 1 Agenda Asked to describe his job, Mike Selves, director of Emergency Management and Homeland Security in Johnson
An Introduction to SCADA-ICS System Security. Document Number IG-101 Document Issue 0.1 Issue date 03 February 2015
An Introduction to SCADA-ICS System Security Document Number IG-101 Document Issue 0.1 Issue date 03 February 2015 Overview Supervisory Control And Data Acquisition (SCADA) for Industrial Control Systems
EDSA-300. ISA Security Compliance Institute Embedded Device Security Assurance ISASecure certification requirements
EDSA-300 ISA Security Compliance Institute Embedded Device Security Assurance ISASecure certification requirements Version 2.0 June 2010 Copyright 2010 ASCI - Automation Standards Compliance Institute,
Availability Digest. www.availabilitydigest.com. Redundant Load Balancing for High Availability July 2013
the Availability Digest Redundant Load Balancing for High Availability July 2013 A large data center can comprise hundreds or thousands of servers. These servers must not only be interconnected, but they
Facilitated Self-Evaluation v1.0
Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) Patricia Hoffman Facilitated Self-Evaluation v1.0 Assistant Secretary Office of Electricity Delivery and Energy Reliability U.S.
Virtual Learning Tools in Cyber Security Education
Virtual Learning Tools in Cyber Security Education Dr. Sherly Abraham Faculty Program Director IT and Cybersecurity Dr. Lifang Shih Associate Dean School of Business & Technology, Excelsior College Overview
NCS 430 Penetration Testing Lab #2 Tuesday, February 10, 2015 John Salamy
1 NCS 430 Penetration Testing Lab #2 Tuesday, February 10, 2015 John Salamy 2 Item I. (What were you asked to do?) Complete Metasploit: Quick Test on page 88-108 of the Penetration Testing book. Complete
Wireless Security: Secure and Public Networks Kory Kirk
Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer Science [email protected] www.korykirk.com/ Abstract Due to the increasing amount of wireless access points that
https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting
https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting Chapter 1 1. Introducing Penetration Testing 1.1 What is penetration testing 1.2 Different types of test 1.2.1 External Tests
Securing EtherNet/IP Using DPI Firewall Technology
Securing EtherNet/IP Using DPI Firewall Technology www.odva.org Technical Track About Us Erik Schweigert Leads device firmware development at Tofino Security BSc in Computer Science from VIU Michael Thomas
Potential Targets - Field Devices
Potential Targets - Field Devices Motorola Field Devices: Remote Terminal Units ACE 3600 Front End Devices ACE IP Gateway ACE Field Interface Unit (ACE FIU) 2 Credential Cracking Repeated attempts to
Meeting the Cybersecurity Standards of ANSI/ISA 62443 with Data Diodes
Meeting the Cybersecurity Standards of ANSI/ISA 62443 with Data Diodes Dennis Lanahan June 1, 2015 Securing the convergence of OT and IT with ST 1 Introduction to Owl US US Owned and & Operated Product
Data Logger & Net Client Software (Windows, ipad, Android) Instant On. Touch. Drop & Drag Opera on. No more proprietary display equipment!
Data Logger & Net Client Software (Windows, ipad, Android) builds an Intelligent HMI system Instant On. Touch. Drop & Drag Opera on. No more proprietary display equipment! Running a HMI system with your
Keeping the Lights On
Keeping the Lights On Fundamentals of Industrial Control Risks, Vulnerabilities, Mitigating Controls, and Regulatory Compliance Learning Goals o Understanding definition of industrial controls o Understanding
What you don t know about industrial GSM/GPRS modem communications
What you don t know about industrial GSM/GPRS modem communications A White Paper presented by: Ira Sharp Product Marketing Lead Specialist Phoenix Contact P.O. Box 4100 Harrisburg, PA 17111-0100 Phone:
WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.
Wireless LAN Attacks and Protection Tools (Section 3 contd.) WLAN Attacks Passive Attack unauthorised party gains access to a network and does not modify any resources on the network Active Attack unauthorised
ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details
Sub: Supply, Installation, setup and testing of Tenable Network Security Nessus vulnerability scanner professional version 6 or latest for scanning the LAN, VLAN, VPN and IPs with 3 years License/Subscription
Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Capture Link Server V1.00
Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak Capture Link Server V1.00 Version 1.0 Eastman Kodak Company, Health Imaging Group Page 1 Table of Contents
NETWORK SECURITY WITH OPENSOURCE FIREWALL
NETWORK SECURITY WITH OPENSOURCE FIREWALL Vivek Kathayat,Dr Laxmi Ahuja AIIT Amity University,Noida [email protected] [email protected] ATTACKER SYSTEM: Backtrack 5r3( 192.168.75.10 ) HOST: Backtrack
