Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Title Page
Copyright Page
Dedication
Contents
Acknowledgments
Introduction
Part I Setting the Stage: Putting ICS Penetration Testing in Context
CASE STUDY, PART 1: Recipe for Disaster
1 Introduction to Industrial Control Systems [In]Security
Cyberphysical Systems: The Rise of the Machines
New Vectors to Old Threats
The Consequences: What Could Happen?
Understanding Realistic Threats and Risks to ICS
Overview of Industrial Control Systems
View
Monitor
Control
Purdue Reference Model for ICS
Types of Common Control Systems, Devices, and Components
Summary
References for Further Reading
2 ICS Risk Assessment
ICS Risk Assessment Primer
The Elusive ICS “Risk Metric”
Risk Assessment Standards
What Should an ICS Risk Assessment Evaluate and Measure?
ICS Risk Assessment Process Overview
ICS Risk Assessment Process Steps
Stage 1: System Identification & Characterization
Stage 2: Vulnerability Identification & Threat Modeling
Next Steps
Summary
References for Further Reading
3 Actionable ICS Threat Intelligence through Threat Modeling
Threat Information vs. Threat Intelligence
Threat Modeling: Turning ICS Threat Information into “Actionable” Threat Intelligence
The ICS Kill Chain
The ICS Threat Modeling Process
Information Collection
Summary
References for Further Reading
CASE STUDY, PART 2: The Emergence of a Threat
Part II Hacking Industrial Control Systems
CASE STUDY, PART 3: A Way In
4 ICS Hacking (Penetration Testing) Strategies
The Purpose of a Penetration Test
Black Box, White Box, Gray Box
Special Considerations: ICS Penetration Testing Is Not IT Penetration Testing
Setting Up a Lab
Sampling “Like” Configured Systems
Virtualization
Equipment
Rules of Engagement
Using Risk Scenarios
ICS Penetration-Testing Strategies
Reconnaissance (“Footprinting”)
External Testing
Pivoting
Thinking Outside of the Network: Asymmetric and Alternative Attack Vectors
Internal Testing: On the ICS Network
Summary
Resources for Further Reading
5 Hacking ICS Protocols
Modbus
EtherNet/IP
DNP3
Siemens S7comms
BACnet
Other Protocols
Protocol Hacking Countermeasures
Summary
References for Further Reading
6 Hacking ICS Devices and Applications
Exploiting Vulnerabilities in Software
Some Basic Principles
Buffer Overflows
Integer Bugs: Overflows, Underflows, Trunction, and Sign Mismatches
Pointer Manipulation
Exploiting Format Strings
Directory Traversal
DLL Hijacking
Cross-Site Scripting
Cross-Site Request Forgery (CSRF)
Exploiting Hard-Coded Values
Brute-Force
All Software Has Bugs
Summary
References for Further Reading
7 ICS “Zero-Day” Vulnerability Research
Thinking Like a Hacker
Step 1: Select Target
Step 2: Study the Documentation
Step 3: List and Prioritize Accessible Interfaces
Step 4: Analyze/Test Each Interface
Fuzzing
Static Binary Analysis
Dynamic Binary Analysis
Step 5: Exploit Vulnerabilities
Putting It All Together: MicroLogix Case Study
Research Preparation
Before Diving In
Creating a Custom Firmware
Summary
References for Further Reading
Tools
General References
8 ICS Malware
ICS Malware Primer
Dropper
Rootkits
Viruses
Adware and Spyware
Worms
Trojan Horses
Ransomware
Infection Vectors
Analyzing ICS Malware
Lab Environment
Summary
References for Further Reading
CASE STUDY, PART 4: Foothold
Part III Putting It All Together: Risk Mitigation
CASE STUDY, PART 5: How Will It End?
9 ICS Security Standards Primer
Compliance vs. Security
Common ICS Cybersecurity Standards
NIST SP 800-82
ISA/IEC 62443 (formerly ISA-99)
NERC CIP
API 1164
CFATS
NRC Regulations 5.71
General Cybersecurity Standards
NIST Cybersecurity Framework
ISO/IEC 27002:2013
Summary
References for Further Reading
10 ICS Risk Mitigation Strategies
Addressing Risk
Special ICS Risk Factors
Confidentiality, Integrity, and Availability (CIA)
Defense-in-Depth
Safety
General ICS Risk Mitigation Considerations
ICS Network Considerations
ICS Host-Based Considerations
ICS Physical Access Considerations
Exploits, Threats, and Vulnerabilities
Eliminating Exploits
Eliminating Threats
Eliminating Vulnerabilities
Additional ICS Risk Mitigation Considerations
System Integration Issues
Compliance vs. Security
Insurance
Honeypots
The Risk Mitigation Process
Integrating the Risk Assessment Steps
Integrating the Risk Scenarios
Performing a Cost-Benefit Analysis
Establishing the Risk Mitigation Strategy
Summary
References for Further Reading
Part IV Appendixes
A Glossary of Acronyms and Abbreviations
B Glossary of Terminology
C ICS Risk Assessment and Penetration Testing Methodology Flowcharts
Index
← Prev
Back
Next →
← Prev
Back
Next →