Operational Technology Attack

SCENARIO INFORMATION

DESCRIPTION

This scenario involves an attack on a facility’s Operational Technology segment.

The attackers use infection vectors to infiltrate the institution’s internal system.

They have access to the OT/PLC segment and are actively engaged with taking full control over the OT system inside the facility.

OBJECTIVES AND OUTCOME

After completing this scenario, you will be able to:

  • Perform network traffic analysis.
  • Conduct client-side forensics.
  • Understand OT vulnerabilities.
  • Perform reverse engineering.

PRE-REQUISITES

In order to get the full benefit from this scenario, it is suggested that you have competencies in the following areas:

  • OT, SCADA and ICS.
  • OT domain.
  • Networking.
  • Forensics.
  • System architecture.
  • Windows administration.

RECOMMENDED READING:

There are no recommended readings for this scenario.

AUTHOR:

This scenario was created by Silensec.

MODE SINGLEPLAYER
Type CYBER CHALLENGE
DIFFICULTY INTERMEDIATE
TIME 2 HOURS

Start Scenario

RegisterLogin

Other Scenarios

Facebook
Twitter
LinkedIn
Reddit
WhatsApp
Telegram
Scroll to Top

Upcoming Webinar Events

Join CYBER RANGES and guests on live Webinars and Bootcamps

Sign up to learn skills and practise on the CYBER RANGES platform