OT Protocols: DNP3
In this lab, you’ll practice analyzing and applying the DNP3 protocol. When you’re finished, you’ll have a solid understanding of how the protocol is structured, and be able to identify suspicious traffic in an operational technology environment.
Terms and conditions apply.
Lab info
Lab author
Challenge
Getting Started in the Lab Environment
Here are the initial instructions and explanation of the lab environment. Read this while your environment is busy creating itself from nothing. Yes, this violates physics; we know. Have fun!
Challenge
Build a DNP3 Analysis Lab
Use a free and open source Programmable Logic Controller and python scripts to simulate a virtual OT environment that will allow you to capture and analyze DNP3 network traffic.
Challenge
Analyze DNP3 Packets
Capture and analyze DNP3 read and write traffic to understand the basic structure and format of the protocol.
Challenge
Exploit the DNP3 protocol
Exploit weaknesses in the DNP3 protocol to enumerate an OT device, suppress alarms and perform an injection attack.
Challenge
The Last Challenge
Welcome to the final challenge! This is your last chance to experiment in the environment. Clicking Finish Lab will end this little world that flittered into existence just for you.
Provided environment for hands-on practice
We will provide the credentials and environment necessary for you to practice right within your browser.
Guided walkthrough
Follow along with the author’s guided walkthrough and build something new in your provided environment!
Did you know?
On average, you retain 75% more of your learning if you get time for practice.
Recommended prerequisites
- Understanding of network protocols, the OSI model and TCP/IP
- Foundational understanding of operational technology concepts.
- Experience of python scripting would be an advantage but is not essential.