Re: SCADA Auditing Tools

From: Mark Wolfgang (moonpieat_private)
Date: Wed Jul 09 2003 - 13:27:55 PDT

  • Next message: noconflic: "Re: Encrypted Password script - easy to defeat"

    Most of the SCADA/EMS/DCS audits I've done have been more risk-based
    (policy driven) than technical approaches due to the chance of
    crashing some old system that can't handle a bunch of SYN packets.
    
    The technical auditing I've done use many of the same tools as a
    normal pen test, but I'll be a LOT more gentle and specific in what
    I'm doing. I won't even portscan operational systems...no
    thanks...don't want the liability.  Of course there are systems in a
    SCADA network that aren't absolutely critical for plant operations
    (such as PI servers) that can be hammered pretty hard using
    traditional methods.   
    
    I try to think of SCADA as "system", much like any other information
    system.  It
    has traditionally spoken more obscure protocols, such as modbus, ICCP,
    and DNP, but is moving to more common protocol stacks such as
    IP.  This is sort of dangerous, in that now all of the IP based
    vulnerabilities accompany this migration.  Of course, security by
    obscurity was never a good approach anyway.
    
    -Mark
    
    On Wed, Jul 09, 2003 at 11:19:42AM -0600 or thereabouts, Alfred Huger wrote:
    > 
    > 
    > Hey all,
    > 
    > Does anyone out there know of any commercial or free SCADA auditing tools?
    > I've looked around and found very little and while I know there are
    > private tools out there I am interested in hearing about those which the
    > public can get their hands on.
    > 
    > Some resources I have found which are pretty decent are:
    > 
    > http://scada.trinux.org/
    > http://grouper.ieee.org/groups/1525/SCADA%20Security/Rtcrypto=SCADA-code.ppt
    > http://www.plantdata.com/SCADA%20Security%20Strategy.pdf
    > http://www.io.com/~mdfranz/papers/franz-API-future-of-scada-security.ppt
    > http://grouper.ieee.org/groups/sub/wgc3/c37sections/clause5/clause5_3_security/Substations%20communications%20system%20security%20D1r2.pdf
    > 
    > 
    > -al
    > 
    > Alfred Huger
    > Symantec Corp.
    > 
    > ---------------------------------------------------------------------------
    > The Lightning Console aggregates IDS events, correlates them with 
    > vulnerability info, reduces false positives with the click of a button, anddistributes this information to hundreds of users.
    > 
    > Visit Tenable Network Security at http://www.tenablesecurity.com to learn 
    > more.
    > ----------------------------------------------------------------------------
    > 
    
    -- 
    Risk accepted by one is imposed on all
    http://moonpie.org
    
    ---------------------------------------------------------------------------
    The Lightning Console aggregates IDS events, correlates them with 
    vulnerability info, reduces false positives with the click of a button, anddistributes this information to hundreds of users.
    
    Visit Tenable Network Security at http://www.tenablesecurity.com to learn 
    more.
    ----------------------------------------------------------------------------
    



    This archive was generated by hypermail 2b30 : Wed Jul 09 2003 - 15:16:40 PDT