19isdfs KW Presentation
19isdfs KW Presentation
19isdfs KW Presentation
ISDFS 2019
SCADA – Overview
… SCADA world is a ripe target for Cyber threats with limited security and forensic expertise.
LAB – Problem Statement
Lack of a SCADA LAB at SHSU for Vulnerability assessments, Penetration
testing and Incident Forensics research
LAB - Benefits
ICS/SCADA Design:
Database
Websites
1. Websites custom programmed using classic ASP and JavaScript
2. Using ODBC for DB connectivity
3. Hosted on IIS with shallow security features
Lab space availability Delay to schedule Medium Work closely with Dept. Facilities
SCADA/ICS Hardware Delay to schedule Medium Plan, schedule and co-ordinate with
Configuration InduSoft Engineers
Lab IT-Hardware (desktops, Delay to schedule Medium Work closely with Dept. and IT Support
switches) availability
LAB – Project schedule
Phase Task
Demonstrate/Validate Lab
Validation
Phase-III Lab Go-Live
Close-out Project close-out (project documentation, metrics, lab documentation, manuscript preparation)
LAB - KAT Engineering and Chemicals
Company Overview
1. Fictious chemical manufacturing company
2. It’s manufacturing plant processes batches of chemicals during manufacturing process
involving batch-mixing, motors, pipelines, furnaces, storage tanks and loading.
3. Releases processed water into environment (a nearby stream/bayou). Valid permits
exist for certain toxicity limits.
4. Financial penalties if toxicity limits breached. Reduced penalties if reported to
government agencies within SLAs.
5. PLCs monitor and report (on HMI screens) various processes including quality of
processed water being released into nearby stream.
Network Firewall rules help segment network. Switches and routers present. Dynamic and static IPs issued.
System Patching irregular - tuned per lab exercise.
A “timed incident bomb” will cause disruption (if Red team is unsuccessful).
SCADA LAB – Project verification controls
# Test Case(s) Primary Software tool used
4 Test for KOYO protocol traffic (KOYO is transmitted as UDP packets) Wireshark
8 Verify if Direct06 PLC is configured to respond via HMI (Indusoft) interface HMI alarms and logs
9 Verify if Eaton PLC is configured to respond via HMI (Indusoft) interface HMI alarms and logs
10 Test for password strength using password cracker tools John the Ripper
11 Perform a penetration test using any known exploit against the lab network Metasploit
12 Test for Windows security patches to expose backdoors Microsoft Baseline Security Analyzer
14 Test for open and vulnerable ports against lab network NMap
16 Test for MD5 or SHA1 cryptographic hashes on drives for forensic evidence Microsoft File Checksum Integrity Verifier
integrity
LAB – Historian database
LAB – SQL Server 2008
LAB – SQL Server 2008
LAB – SQL Server 2008
LAB – Simulators MODBUS and OPC
LAB – Simulators DNP and IE104 contd.
LAB – Batch FTP Jobs
LAB – FTP Destination Screen
LAB – Completed Deliverables
Budget of $50 in 4
months with vendor
donated industrial
hardware