TGICS 301: Introduction to ICS Penetration Testing

 

Understanding the adversaries’ offensive methods, strategies, and techniques is paramount in order to build an efficient and cost-effective cybersecurity program and risk mitigation strategy. This class builds upon these concepts that were introduced in ICS 101 by adding hands-on labs that that will help students gain a technical understanding of some of common attack techniques used by adversaries. Students will also learn how setup, manage and perform an ICS penetration testing project, including the special considerations for critical ICS environments.

What you will get out of this class:

  • Learn to setup, manage and perform ICS penetration testing projects
  • Learn how to perform penetration testing for sensitive critical environments and systems
  • Gain a technical understanding of some of the most commonly used ICS attack vectors and techniques
  • Get hands-on experience exploiting some of the most common ICS protocol, device, and application vulnerabilities
  • Experience realistic industrial environment feedback using ThreatGEN’s 3D Industrial Process Simulation Platform
  • Taught by industry-leading, world-class ICS cybersecurity experts with years of real-world experience

Intended Audience:

  • Anyone interested in gaining intermediate knowledge of ICS/OT cybersecurity
  • Anyone interested in or tasked with ICS/OT risk assessment and management
  • Anyone interested in learning more about technical ICS/OT penetration testing
  • Cybersecurity managers looking for technical understanding
  • Plant managers and asset owners looking for technical understanding
  • IT cybersecurity staff tasked with ICS/OT cybersecurity
  • Engineers tasked with ICS/OT cybersecurity

Class Outline

  • ICS Attack Surface
    • Common ICS Attack Vectors
    • ICS Specific Attack/Exploit Strategies
  • Managing an ICS Pentest
    • WHY & WHEN TO PERFORM A PENETRATION TEST
    • TYPES OF PENETRATION TESTS
    • ICS/SCADA VS. ENTERPRISE IT PENETRATION TEST CONSIDERATIONS
    • OVERVIEW OF KEY STEPS
    • TEST PLAN: ASSIGNING PERSONNEL
    • TEST PLAN: DETERMINING THE SCOPE
    • TEST PLAN: METHODOLOGY
    • TEST PLAN: COMMON TOOLS
    • TEST PLAN: SCHEDULE
    • TEST PLAN: SECURITY
    • TEST PLAN: KICKOFF MEETING
    • PENETRATION TEST STRATEGIES & CHECKLISTS
    • REPORTING
  • Attack Methods Overview
    • Anatomy of an Attack Overview
    • ICS Cyber Kill Chain
    • Attack Methods Overview
      • Recon (information gathering)
      • Internet Footprinting
      • Information Gathering with Google
      • Shodan
      • Maltego
      • Host Scanning
      • Port Scanning
      • Service Enumeration
      • Vulnerability Identification (Overview)
        • Vulnerability Mapping
        • Zero-Days
        • Fuzzing (High-Level Overview)
        • Reverse Engineering (High-Level Overview)
      • Exploitation Overview
        • Exploit Planning, Development, & Testing (Beginner to Novice Level Overview)
        • Exploit Types
      • Social Engineering
        • Human Vectors
        • Technical Vectors
        • Techniques (Overview)
      • Physical Access Methods (Overview)
    • Post-Exploitation Overview
      • Pivoting
      • Hiding Your Tracks
      • Persistence
      • Pilfering
      • Man-In-The Middle (MITM)