Operational Technology Attack

SCENARIO INFORMATION

DESCRIPTION

This scenario involves an attack on a facility’s Operational Technology segment.

The attackers use infection vectors to infiltrate the institution’s internal system.

They have access to the OT/PLC segment and are actively engaged with taking full control over the OT system inside the facility.

OBJECTIVES AND OUTCOME

After completing this scenario, you will be able to:

  • Perform network traffic analysis.
  • Conduct client-side forensics.
  • Understand OT vulnerabilities.
  • Perform reverse engineering.

PRE-REQUISITES

In order to get the full benefit from this scenario, it is suggested that you have competencies in the following areas:

  • OT, SCADA and ICS.
  • OT domain.
  • Networking.
  • Forensics.
  • System architecture.
  • Windows administration.

RECOMMENDED READING:

There are no recommended readings for this scenario.

AUTHOR:

This scenario was created by Silensec.

MODE SINGLEPLAYER
Type CYBER CHALLENGE
DIFFICULTY INTERMEDIATE
TIME 2 HOURS

Start Scenario

RegisterLogin

Other Scenarios

Facebook
Twitter
LinkedIn
Reddit
WhatsApp
Telegram
Scroll to Top

Introducing Threat-eX™

6-Event Cyberdrill Program

Threat-eX™ is a comprehensive 6-month program of Live Webinars and CYBER RANGES simulations, delivering effective, threat-informed operations training, professional development and certification