The Skinny Research and Development SCADA Intrusion Fundamentals (SIF) class tackles a new era of computing that encompasses Cyber-Physical systems, including Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems (ICS). To keep up with the increasing demand for high-speed service and the efficient delivery of household essentials, the critical infrastructure of modern society depends on computing to manage, automate, and protect assets such as power grids, food production, water treatment, sewage, traffic lights, oil and gas, and many more critical infrastructure sectors.
Attacks on critical infrastructure are becoming increasingly common with the rise of computer automation and high-speed internet connectivity. In comparison with traditional cyber attacks, attacks on SCADA systems pose a physical risk to human lives and the surrounding environment.
Students will gain the technical and procedural skills required to efficiently assess the cybersecurity posture of SCADA systems, and take advantage of these flaws to induce physical effects. The SCADA Intrusion Fundamentals class is hands-on focused and will provide students with the unique opportunity to manipulate physical systems using advanced cyber tactics. By the end of the course, students will walk away with a selection of tools, software, and procedures to ensure they can replicate methodologies and continue developing their skills using their own personal SCADA test range.
Students will receive:
- Unipi 1.1 Kit
- Unipi 1.1 Board
- Raspberry Pi
- Connector Cable
- 1-Wire Thermometer
- Mervis software license
- DIN rail holder
- 16GB microSD memory card
- Unipi 1.1 cover
- Power Supply for DIN rail
Day 1 | Day 2 | Day 3 | Day 4 | Day 5 |
Introduction SCADA Systems Internet SCADA Systems Finding Credentials Nmap/Netcat Exercise Acessing the HMI |
Phishing Campaigns Sniffing Traffic Finding Devices Attacking SCADA Devices Exercises |
Attacking SCADA Devices Exercises Packet Analysis Modbus/TCP SCADA & Metasploit PyModbus |
LoRA for Distance Intercepting LoRa Transmitting with LoRA LoRa Manipulation Malware Ransomware |
USB Attacks Known Vulnerabilities Capture the Flag Event Continuous Learning Materials |