• Labs icon Lab
  • Security
Google Cloud Platform icon
Labs

Network Analysis: Defending SCADA Networks

In this lab, you’ll practice Analysis using Wireshark and Perform Attacks against SCADA systems. When you’re finished, you’ll have Demonstrated methods to reduce attack surface and mitigate attacks.

Google Cloud Platform icon
Labs

Path Info

Level
Clock icon Beginner
Duration
Clock icon 1h 5m
Published
Clock icon Dec 19, 2023

Contact sales

By filling out this form and clicking submit, you acknowledge our privacy policy.

Table of Contents

  1. Challenge

    Getting Started in the Lab Environment

    Here are the initial instructions and explanation of the lab environment. Read this while your environment is busy creating itself from nothing. Yes, this violates physics; we know. How fun!

  2. Challenge

    Analyzing SCADA Network Communication

    You will explore the ModBus protocol and what the communication of this looks like from the packet level. This introduction will show the reading and writing of registers and the different function codes that can be used to start and stop devices. This will show how these SCADA protocols were developed with no concept of security, and as a result of this, the entire communication sequence is in clear text; furthermore, there are no protections in place from outside attackers!

  3. Challenge

    Attacks and Defense against SCADA Network Communication

    Observe network communication when an attack is made against Availability and Confidentiality at the packet level. Identify the characteristics of malicious packets and network communication. Mitigate the confidentiality attack using built-in filters to control who can poll the slave device.

  4. Challenge

    The Last Challenge

    Welcome to the final challenge! This is your last chance to experiment in the environment. Clicking Finish Lab will end this little world that came into existence just for you,

Kevin Cardwell provides consulting services for companies throughout the world and is an adviser to numerous government entities across the globe. He is an instructor, technical editor, and author for computer forensics and hacking courses. He is author of Building Virtual Pentesting Labs for Advanced Penetration Testing, first and second edition.

What's a lab?

Hands-on Labs are real environments created by industry experts to help you learn. These environments help you gain knowledge and experience, practice without compromising your system, test without risk, destroy without fear, and let you learn from your mistakes. Hands-on Labs: practice your skills before delivering in the real world.

Provided environment for hands-on practice

We will provide the credentials and environment necessary for you to practice right within your browser.

Guided walkthrough

Follow along with the author’s guided walkthrough and build something new in your provided environment!

Did you know?

On average, you retain 75% more of your learning if you get time for practice.