Operational Technology Attack

SCENARIO INFORMATION

DESCRIPTION

This scenario involves an attack on a facility’s Operational Technology segment.

The attackers use infection vectors to infiltrate the institution’s internal system.

They have access to the OT/PLC segment and are actively engaged with taking full control over the OT system inside the facility.

OBJECTIVES AND OUTCOME

After completing this scenario, you will be able to:

  • Perform network traffic analysis.
  • Conduct client-side forensics.
  • Understand OT vulnerabilities.
  • Perform reverse engineering.

PRE-REQUISITES

In order to get the full benefit from this scenario, it is suggested that you have competencies in the following areas:

  • OT, SCADA and ICS.
  • OT domain.
  • Networking.
  • Forensics.
  • System architecture.
  • Windows administration.

RECOMMENDED READING:

There are no recommended readings for this scenario.

AUTHOR:

This scenario was created by Silensec.

MODE SINGLEPLAYER
Type CYBER CHALLENGE
DIFFICULTY INTERMEDIATE
TIME 2 HOURS
COST 1000 GEMS

Start Scenario

RegisterLogin
Share on facebook
Facebook
Share on twitter
Twitter
Share on linkedin
LinkedIn
Share on reddit
Reddit
Share on whatsapp
WhatsApp
Share on telegram
Telegram
Scroll to Top