Reader small image

You're reading from  Pentesting Industrial Control Systems

Product typeBook
Published inDec 2021
PublisherPackt
ISBN-139781800202382
Edition1st Edition
Right arrow
Author (1)
Paul Smith
Paul Smith
author image
Paul Smith

Paul Smith has spent close to 20 years in the automation control space, tackling the "red herring" problems that are thrown his way. He has handled unique issues such as measurement imbalances resulting from flare sensor saturation, database migration mishaps, and many more. This ultimately led to the later part of his career, where he has been spending most of his time in the industrial cybersecurity space pioneering the use of new security technology in the energy, utility, and critical infrastructure sectors, and helping develop cybersecurity strategies through the use of red team/pentest engagements, cybersecurity risk assessments, and tabletop exercises for some of the world's largest government contractors, industrial organizations, and municipalities.
Read more about Paul Smith

Right arrow

Running BurpSuite

In the previous section, we installed FoxyProxy and configured some settings to accommodate our BurpSuite software. In this section, we are going to utilize BurpSuite to help us understand the Request/Response actions that Ignition SCADA utilizes to perform authentication and authorization. Now, for us to proceed, we need to add BurpSuite's certificate as a trusted source; otherwise, we will be forced to acknowledge every website we've visited as an exception.

To do this, we must navigate to the IP address and port that we configured in our settings. Upon doing this, you will be presented with a BurpSuite Community Edition splash page with a CA Certificate button on the right-hand side, as shown here:

Figure 9.10 – CA Certificate location

Upon clicking this button, you will be presented with the following screen:

Figure 9.11 – Saving the CA Certificate

Select Save File and click the OK button...

lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
Pentesting Industrial Control Systems
Published in: Dec 2021Publisher: PacktISBN-13: 9781800202382

Author (1)

author image
Paul Smith

Paul Smith has spent close to 20 years in the automation control space, tackling the "red herring" problems that are thrown his way. He has handled unique issues such as measurement imbalances resulting from flare sensor saturation, database migration mishaps, and many more. This ultimately led to the later part of his career, where he has been spending most of his time in the industrial cybersecurity space pioneering the use of new security technology in the energy, utility, and critical infrastructure sectors, and helping develop cybersecurity strategies through the use of red team/pentest engagements, cybersecurity risk assessments, and tabletop exercises for some of the world's largest government contractors, industrial organizations, and municipalities.
Read more about Paul Smith