Reader small image

You're reading from  Pentesting Industrial Control Systems

Product typeBook
Published inDec 2021
PublisherPackt
ISBN-139781800202382
Edition1st Edition
Right arrow
Author (1)
Paul Smith
Paul Smith
author image
Paul Smith

Paul Smith has spent close to 20 years in the automation control space, tackling the "red herring" problems that are thrown his way. He has handled unique issues such as measurement imbalances resulting from flare sensor saturation, database migration mishaps, and many more. This ultimately led to the later part of his career, where he has been spending most of his time in the industrial cybersecurity space pioneering the use of new security technology in the energy, utility, and critical infrastructure sectors, and helping develop cybersecurity strategies through the use of red team/pentest engagements, cybersecurity risk assessments, and tabletop exercises for some of the world's largest government contractors, industrial organizations, and municipalities.
Read more about Paul Smith

Right arrow

User interface control

Now, I know that we installed a SCADA system into our lab for testing purposes, and yes, we have been beating up on Ignition SCADA throughout this book, but know that performing these actions and practicing these attacks translates into real industry installations. At the core of all SCADA and Distributed Control Systems (DCS) lies the same underlying principle:

  1. Take in the input.
  2. Run logic and routines against the input.
  3. Deliver the output to the process.

This means that even though countless companies are producing SCADA and DCS software, they all function the same way. The following are a few systems that you may see:

  • Weatherford Cygent SCADA
  • Schneider Electric Telvent
  • Emerson Zedi Solutions, Ovation, Progea, and DeltaV
  • Aveva Citech SCADA
  • Honeywell Experion
  • ABB SCADAvantage, Symphony, and 800xA
  • GE Cimplicity
  • SurvalentOne SCADA

The list goes on, and the one supplied here is a generalized list...

lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
Pentesting Industrial Control Systems
Published in: Dec 2021Publisher: PacktISBN-13: 9781800202382

Author (1)

author image
Paul Smith

Paul Smith has spent close to 20 years in the automation control space, tackling the "red herring" problems that are thrown his way. He has handled unique issues such as measurement imbalances resulting from flare sensor saturation, database migration mishaps, and many more. This ultimately led to the later part of his career, where he has been spending most of his time in the industrial cybersecurity space pioneering the use of new security technology in the energy, utility, and critical infrastructure sectors, and helping develop cybersecurity strategies through the use of red team/pentest engagements, cybersecurity risk assessments, and tabletop exercises for some of the world's largest government contractors, industrial organizations, and municipalities.
Read more about Paul Smith