Overview
Explore red teaming techniques for manufacturing networks in this 52-minute conference talk from BSidesLV 2018. Delve into potential methodologies, including internet reconnaissance, passive techniques, and physical attacks. Learn about common findings, mitigation measures, and the importance of understanding risks in industrial control systems. Gain insights on conducting effective red team assessments without compromising operational safety. Discover practical tools like Wireshark and strategies for securing manufacturing environments against cyber threats.
Syllabus
Introduction
Agenda
Terms
Why Red Team
Manufacturing Networks
Potential Methodology
S scoping
Internet reconnaissance
Pastebin and GitHub
Office IT Network
Fake Website
Passive Techniques
Common HMIs
Control Network
Passive Reconnaissance
Replay Attack
Physical Attack
Worst Case Scenario
Lessons Learned
Common Findings
Mitigation Measures
Know Your Risks
Resources
Questions
Wireshark
Red Team Assessment
Taught by
BSidesLV