SlideShare a Scribd company logo
SSCCAADDAA SSeeccuurriittyy 
SSCCAADDAA SSeeccuurriittyy || AAhhmmeedd SShheerriiff 22001144
AAggeennddaa 
IInndduussttrriiaall CCoonnttrrooll SSyysstteemmss 
● WWhhaatt iiss iitt ?? 
PPLLCC 
● DDeeffiinniittiioonnss 
● HHooww DDooeess iitt wwoorrkk ?? 
SSCCAADDAA 
● DDeeffiinniittiioonnss 
● HHooww DDooeess iitt wwoorrkk ?? 
SCADA Security | Ahmed Sherif 2014
AAggeennddaa 
● Some Incidents 
● Stuxnet VS PLC 
● Security Best Practices 
SCADA Security | Ahmed Sherif 2014
IInndduussttrriiaall CCoonnttrrooll SSyysstteemmss 
● Industrial control system (ICS) is a general term that 
encompasses several types of control systems used 
in industrial production, including supervisory control 
and data acquisition (SCADA) systems, distributed 
control systems (DCS), and other smaller control 
system configurations such as programmable logic 
controllers (PLC) often found in the industrial sectors 
and critical infrastructures. 
SCADA Security | Ahmed Sherif 2014
PPLLCC 
● A Programmable Logic Controller, PLC or 
Programmable Controller is a digital computer 
used for automation of typically industrial 
electromechanical processes, such as control 
of machinery on factory assembly lines, 
amusement rides, or light fixtures. PLCs are 
used in many industries and machines 
SCADA Security | Ahmed Sherif 2014
PPLLCC –– HHooww DDooeess iitt WWoorrkk ?? 
1. Computer is Connected to PLC unit Through Ethernet, RS-232, RS-485 or 
RS-422 cabling . 
2. The programming software allows entry and editing of the ladder-style logic 
3. the program is transferred from a personal computer to the PLC through a 
programming board which writes the program into a removable chip such as an 
EEPROM 
4. The Program Then Can Be Run and Executed. 
SCADA Security | Ahmed Sherif 2014
PLC – How Does it Work ? 
1. Computer is Connected to PLC unit Through Ethernet, RS-232, 
RS-485 or RS-422 cabling . 
SCADA Security | Ahmed Sherif 2014
PLC – How Does it Work ? 
2. The programming software allows entry and editing of the 
ladder-style logic 
SCADA Security | Ahmed Sherif 2014
PLC – How Does it Work ? 
3. the program is transferred from a personal computer to the PLC 
through a programming board which writes the program into a 
removable chip such as an EEPROM 
SCADA Security | Ahmed Sherif 2014
PLC – How Does it Work ? 
4. The Program Then Can Be Run and Executed. 
SCADA Security | Ahmed Sherif 2014
PLC – Simulation 
SCADA Security | Ahmed Sherif 2014
SCADA 
SCADA is .... 
Industrial Control Systems (ICS), commonly referred to as 
SCADA underlie much of the infrastructure that makes every day 
life possible in the modern world. 
SCADA Security | Ahmed Sherif 2014
SCADA 
SSCCAADDAA iiss ........ 
● Industrial Control Systems (ICS), commonly 
referred to as 
● SCADA underlie much of the infrastructure that 
makes every day 
● life possible in the modern world. 
● Supervisory Control and Data Acquisition 
SCADA Security | Ahmed Sherif 2014
SCADA 
SCADA is used For .... 
PPOOWWEERR GGrriiddss 
SCADA Security | Ahmed Sherif 2014
SCADA 
SSCCAADDAA iiss uusseedd FFoorr ........ 
PPiippeeLLiinneess 
SCADA Security | Ahmed Sherif 2014
SCADA 
SSCCAADDAA iiss uusseedd FFoorr ........ 
IInntteerr-- 
ccoonnnneecctteedd 
sseennssoorrss aanndd 
ccoonnttrroollss 
uunnddeerr 
cceennttrraall 
mmaannaaggeemmeenntt 
SCADA Security | Ahmed Sherif 2014
SCADA 
SSCCAADDAA iiss uusseedd FFoorr ........ 
cchheemmiiccaall ppllaanntt,, 
ppoowweerr ppllaanntt,, 
mmaannuuffaaccttuurriinngg 
ffaacciilliittyy 
SCADA Security | Ahmed Sherif 2014
SCADA 
SSCCAADDAA iiss uusseedd FFoorr ........ 
IInntteerr-- 
ccoonnnneecctteedd 
sseennssoorrss aanndd 
ccoonnttrroollss 
uunnddeerr 
cceennttrraall 
mmaannaaggeemmeenntt 
SCADA Security | Ahmed Sherif 2014
SCADA 
SSCCAADDAA iiss uusseedd FFoorr ........ 
TTrraaffffiicc SSiiggnnaall 
SCADA Security | Ahmed Sherif 2014
HHooww DDooeess SSccaaddaa WWoorrkkss ?? 
PPhhyyssiiccaall MMeeaassuurreemmeenntt//ccoonnttrrooll eennddppooiinnttss:: 
● RTU, PLC 
● Measure voltage, adjust valve, flip switch 
IInntteerrmmeeddiiaattee pprroocceessssiinngg 
● Usually based on a commonly used Oses 
● *nix, Windows, VMS 
SCADA Security | Ahmed Sherif 2014
HHooww DDooeess SSccaaddaa WWoorrkkss ?? 
CCoommmmuunniiccaattiioonn IInnffrraassttrruuccttuurree 
● Serial, Internet, Wi­fi 
● Modbus, DNP3, OPC, ICCP 
SCADA Security | Ahmed Sherif 2014
SCADA Security | Ahmed Sherif 2014
Components ooff aa SSCCAADDAA nneettwwoorrkk 
● RTU / PLC – Reads information on voltage, flow, the 
status of 
switches or valves. Controls pumps, switches, valves 
● MTU – Master Terminal Unit – Processes data to send 
to HMI 
● HMI – Human Machine Interface – GUI, Windows – 
Information 
traditionally presented in the form of a mimic diagram 
● Communication network – LAN, Wireless, Fiber etc etc 
SCADA Security | Ahmed Sherif 2014
PPrroottooccoollss ooff SSccaaddaa NNeettwwoorrkk 
RRaaww DDaattaa PPrroottooccoollss –– MMooddbbuuss // DDNNPP33 
● For serial radio links mainly, but you can run anything over 
● anything these days, especially TCP/IP (for better or worse) 
● Reads data (measures voltage / fluid flow etc) 
● Sends commands (flips switches, starts pumps) / alerts (it’s 
● broken!) 
HHiigghh LLeevveell DDaattaa PPrroottooccoollss –– IICCCCPP // OOCCPP 
● Designed to send data / commands between apps / databases 
● Provides info for humans 
● These protocols often bridge between office and control 
● networks 
SCADA Security | Ahmed Sherif 2014
TTeessttiinngg SSccaaddaa NNeettwwoorrkkss 
SCADA Security | Ahmed Sherif 2014
SSccrriipptt KKiiddddiieess vvss SSccaaddaa 
SSoommeettiimmeess iitt DDooeessnn''tt rreeqquuiirree HHiigghh 
SSkkiillllss ccoozz ...... 
● TTeennaabbllee hhaass rreelleeaasseedd 3322 pplluugg--iinnss 
ffoorr NNeessssuuss wwhhiicchh ssppeecciiffiiccaallllyy tteesstt 
SSCCAADDAA ddeevviicceess 
● CCoorree--IImmppaacctt aanndd MMeettaassppllooiitt nnooww 
iinncclluuddee SSCCAADDAA hhaacckkss ((SSiinnccee 
AAuugguusstt 22000088)) 
SCADA Security | Ahmed Sherif 2014
SSCCAADDAA ((iinn)) sseeccuurriittyy 
LLaacckk ooff AAuutthheennttiiccaattiioonn 
● I don’t mean lack of strong authentication. I mean NO AUTH!! 
● There’s no “users” on an automated system 
● OPC on Windows requires anonymous login rights for DCOM 
● (XPSP2 breaks SCADA because anonymous DCOM off by 
● default) 
● Normal policies regarding user management, password rotation 
● etc etc do not apply 
SCADA Security | Ahmed Sherif 2014
SSCCAADDAA ((iinn)) sseeccuurriittyy 
CCaann’’tt PPaattcchh,, WWoonn’’tt ppaattcchh 
● SCADA systems traditionally aren’t patched 
● Install the system, replace the system a decade later 
● Effects of patching a system can be worse than the 
effects of 
● compromise? 
● Very large vulnerability window 
SCADA Security | Ahmed Sherif 2014
IInncciiddeennttss !! !! 
SCADA Security | Ahmed Sherif 2014
IInncciiddeennttss !! !! 
In 2000, in Queensland, Australia. Vitek Boden 
released millions of liters of Untreated Sewage 
Into fresh water streams using a wireless laptop. 
SCADA Security | Ahmed Sherif 2014
IInncciiddeennttss !! !! 
“In August 2003 Slammer infected a private computer network at 
the idled Davis­Besse 
nuclear power plant in Oak Harbor, Ohio, 
disabling a safety monitoring system for nearly five hours.” 
SCADA Security | Ahmed Sherif 2014
IInncciiddeennttss !! !! 
In 2003, the east coast of America experienced a blackout. 
While the Blaster worm was not the cause, many related 
systems were found to be infected 
SCADA Security | Ahmed Sherif 2014
IInncciiddeennttss !! !! 
In 1997, a teenager broke into NYNEX and cut off Worcester 
Airport in Massachusetts for 6 hours by affecting ground and air 
communications 
SCADA Security | Ahmed Sherif 2014
TThhee NNiigghhttmmaarree ....SSttuuxxnneett 
SCADA Security | Ahmed Sherif 2014
TThhee NNiigghhttmmaarree ....SSttuuxxnneett 
TTaarrggeettss SSccaaddaa NNeettwwoorrkkss 
● Siemens Simatic WinCC specifically. 
UUsseess RRoooottKKiitt tteecchhnnoollooggyy ttoo hhiiddee iittsseellff 
● Classic Windows rootkit 
● PLC rootkit 
SSpprreeaaddss vviiaa UUSSBB ssttiicckkss aanndd nneettwwoorrkk sshhaarreess 
● Uses 4 Zero-day vulnerabilities 
SCADA Security | Ahmed Sherif 2014
TThhee NNiigghhttmmaarree ....SSttuuxxnneett 
MMaalliicciioouuss ppaayyllooaadd ssiiggnneedd wwiitthh ssttoolleenn 
ddiiggiittaall CCeerrttiiffiiccaatteess 
● Realtek and Jmicron. 
IInnffeecctteedd MMaacchhiinneess bbeeccoommee ppaarrtt ooff 
tthhee SSttuuxxnneett bboottnneett 
● Can Steal code,documents, Projects designs . 
● Can inject and hide code into PLCs – modifying 
production processes. 
SCADA Security | Ahmed Sherif 2014
SSttuuxxnneett .... DDeeeeppeerr LLooookk 
● MMaaiinn DDrrooppppeerr 
This section contains the main stuxnet DLL file. And this DLL contains all stuxnet’s 
functions, mechanisms, files and rootkits. 
SCADA Security | Ahmed Sherif 2014
SSttuuxxnneett .... DDeeeeppeerr LLooookk 
● After finding this section, it loads stuxnet DLL file in a special way. 
11..EEssccaallaattiinngg tthhee PPrriivviilleeggeess aanndd IInnjjeeccttiinngg IInnttoo aa NNeeww 
PPrroocceessss.. 
● It checks if the configuration data is correct and recent and then it checks the admin rights. If 
it’s not running on administrator level, it uses one of two zero-day vulnerabilities to escalate 
the privileges and run in the administrator level. 
● CVE-2010-2743(MS-10-073) –Win32K.sys Keyboard Layout Vulnerability 
● CVE-xxxx-xxxx(MS-xx-xxx) –Windows Task Scheduler Vulnerability 
● These two vulnerabilities allow the worm to escalate the privileges and run in a new 
● process (“csrss.exe” in case of Win32K.sys) or as a new task in the Task Scheduler case 
SCADA Security | Ahmed Sherif 2014
SSttuuxxnneett .... DDeeeeppeerr LLooookk 
11..EEssccaallaattiinngg tthhee PPrriivviilleeggeess aanndd IInnjjeeccttiinngg IInnttoo aa NNeeww 
PPrroocceessss.. 
After everything goes right and the environment is prepared to be infected by stuxnet, it 
injects itself into another process to install itself from that process. 
The injection begins by searching for an Antivirus application installed in the machine 
Depending on the antivirus application (AVP or McAfee or what?), stuxnet chooses the 
process to inject itself into. If there’s no antivirus program it chooses “lsass.exe” 
SCADA Security | Ahmed Sherif 2014
SSttuuxxnneett .... DDeeeeppeerr LLooookk 
22..IInnssttaalllliinngg SSttuuxxnneett iinnttoo tthhee 
IInnffeecctteedd MMaacchhiinnee.. 
The Function #16 begins by checking the configuration data and be sure that everything 
is ready to begin the installation. And also, it checks if the there’s a value in the registry 
with this name “NTVDM TRACE” in 
SOFTWAREMicrosoftWindowsCurrentVersionMS-DOS Emulation 
And then, it checks if this value equal to “19790509”. 
This special number seems a date “May 9, 1979” and this date has a historical meaning 
(by Wikipedia) “Habib Elghanian was executed by a firing squad in Tehran sending 
shock waves through the closely knit Iranian Jewish community” 
SCADA Security | Ahmed Sherif 2014
SSttuuxxnneett .... DDeeeeppeerr LLooookk 
33..TThhee UUSSBB DDrriivveess IInnffeeccttiioonn 
For infecting USB Flash memory, Stuxnet creates a new hidden window “AFX64c313” 
and get notified of any new USB flash memory inserted to the computer by waiting for “WM_DEVICECHANGE” 
Windows Message. 
● After getting notified of a new drive added to the computer (USB Flash Memory), 
stuxnet writes 6 files into the flash memory drive: 
● Copy of Shortcut to.lnk 
● Copy of Copy of Shortcut to.lnk 
● Copy of Copy of Copy of Shortcut to.lnk 
● Copy of Copy of Copy of Copy of Shortcut to.lnk 
● And 2 executable files (DLL files): 
● ~WTR4141.tmp 
● ~WTR4132.tmp 
These malformed shortcut files use vulnerability in Windows Shell named: 
● CVE-2010-2568(MS-10-046) -Windows Shell LNK Vulnerability 
SCADA Security | Ahmed Sherif 2014
WWaass iitt aa ssuucccceessss ?? 
SCADA Security | Ahmed Sherif 2014
SSeeccuurriittyy BBeesstt PPrraaccttiicciieess 
● Real World Scenario 
SCADA Security | Ahmed Sherif 2014
SSeeccuurriittyy BBeesstt PPrraaccttiicciieess 
● Real World Scenario 
SCADA Security | Ahmed Sherif 2014
SSeeccuurriittyy BBeesstt PPrraaccttiicciieess 
● Real World Scenario 
SCADA Security | Ahmed Sherif 2014
SSeeccuurriittyy BBeesstt PPrraaccttiicciieess 
● Real World Scenario 
SCADA Security | Ahmed Sherif 2014
SSeeccuurriittyy BBeesstt PPrraaccttiicciieess 
● Real World Scenario 
SCADA Security | Ahmed Sherif 2014
SSeeccuurriittyy BBeesstt PPrraaccttiicciieess 
● Real World Scenario 
SCADA Security | Ahmed Sherif 2014
SSeeccuurriittyy BBeesstt PPrraaccttiicciieess 
● Real World Scenario 
SCADA Security | Ahmed Sherif 2014
SSeeccuurriittyy BBeesstt PPrraaccttiicciieess 
● Real World Scenario 
SCADA Security | Ahmed Sherif 2014
SShhooddaann && SSCCAADDAA 
port:161 country:US simatic 
SCADA Security | Ahmed Sherif 2014
SShhooddaann && SSCCAADDAA 
Python shodan_scan.py user.list pass.list 
SCADA Security | Ahmed Sherif 2014
SSeeccuurriittyy BBeesstt PPrraaccttiicciieess 
IInnffoorrmmaattiioonn PPrrootteeccttiioonn GGuuiiddeelliinneess:: 
● Create strong passwords and protect those passwords. 
● Use a security token (or some other additional protection method) with a 
password to provide much stronger protection than a password alone. 
● Take great care in what you publish on the internet and your company intranet. 
● Sanitize or destroy all equipment that may contain critical information. 
● Follow your company's reporting procedures if you observe any suspicious or 
abnormal activity. 
SCADA Security | Ahmed Sherif 2014
SSeeccuurriittyy BBeesstt PPrraaccttiicciieess 
PPhhyyssiiccaall PPrrootteeccttiioonn GGuuiiddeelliinneess:: 
● Limit access to systems you're responsible for to those who have a need to know. 
● Protect systems and information (use password-protected screen savers, lock office 
doors, lock information in cabinets, etc.) when leaving them unattended. 
● When traveling, pay special attention when going through airport security. Thieves 
may be able to steal your laptop while you are focusing on getting through the 
security checkpoint. 
● Never leave systems or storage media in your vehicle. 
● Protect work systems and information at home at the same level or higher as you 
would at work. 
SCADA Security | Ahmed Sherif 2014
SSoo,, IIss SSccaaddaa IImmppoorrttaanntt ?? 
● No ... 
● Why ?! ... 
SCADA Security | Ahmed Sherif 2014
Any Questions ? 
SCADA Security | Ahmed Sherif 2014

More Related Content

PPTX
Scada Industrial Control Systems Penetration Testing
PDF
Database Security Threats - MariaDB Security Best Practices
PDF
Defcon through the_eyes_of_the_attacker_2018_slides
PPT
CEH - Module 10 : Denial of Service
PPT
Database security
PPTX
Building active directory lab for red teaming
PDF
Stuxnet under the_microscope
PDF
Targeted attacks
Scada Industrial Control Systems Penetration Testing
Database Security Threats - MariaDB Security Best Practices
Defcon through the_eyes_of_the_attacker_2018_slides
CEH - Module 10 : Denial of Service
Database security
Building active directory lab for red teaming
Stuxnet under the_microscope
Targeted attacks

What's hot (20)

PDF
The World's First Cyber Weapon - Stuxnet
PDF
Going Purple : From full time breaker to part time fixer: 1 year later
PDF
The Current ICS Threat Landscape
PDF
The Cyber Attack Lifecycle
PDF
Building Business Service Intelligence with ITSI
PDF
how to install VMware
PPTX
Android Hacking + Pentesting
PPT
Clustering and High Availability
PPTX
Snort
PDF
How to perform an Infrastructure Security Gap Analysis
PDF
INTERVIEW QUESTION FOR IT AUDITOR
PPT
Big Data (security Issue)
PPTX
Intrusion detection system
PPTX
PhD Defense of Teodoro Montanaro
PPTX
Web Application firewall-Mod security
PPTX
Virtual machines and containers
PDF
Securing SCADA
PDF
SCADA Security Presentation
PPTX
Network security
The World's First Cyber Weapon - Stuxnet
Going Purple : From full time breaker to part time fixer: 1 year later
The Current ICS Threat Landscape
The Cyber Attack Lifecycle
Building Business Service Intelligence with ITSI
how to install VMware
Android Hacking + Pentesting
Clustering and High Availability
Snort
How to perform an Infrastructure Security Gap Analysis
INTERVIEW QUESTION FOR IT AUDITOR
Big Data (security Issue)
Intrusion detection system
PhD Defense of Teodoro Montanaro
Web Application firewall-Mod security
Virtual machines and containers
Securing SCADA
SCADA Security Presentation
Network security
Ad

Similar to Scada Security & Penetration Testing (20)

PPTX
lakshit industrial training.pptx of plc and scada
PDF
Unit Three.pdfrhykyfgdsfuliuyfgm,i;poiuyrtghkl;ipoiy
PPTX
Automation with plc & scada
PPT
Scada Classification By-Rahul Mehra
PPTX
Automation PLC & SCADA
PPTX
Choosing a SCADA System for the IIoT Era
PDF
6f56821e-94cd-466c-b5a8-1ada720cba68 (1).pdf
PPTX
Final Presentation
PDF
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
PPTX
SCADA Security Training
PDF
DTS Solution - SCADA Security Solutions
PDF
Understanding fiber optic technology for scada
PPTX
yogesh zodge ( ARTIFICIAL INTELLIGANCE) (1).pptx
PDF
2014_NXP_Functional Safety Compliance Throughout the Vehicle with SafeAssure ...
PDF
PLCs in diving systems_ a life cycle Presented by Ed Gardyne of Safewell. Man...
DOCX
Alcohol report
PDF
what is Scada in Pipeline Operation .pdf
PDF
B43050518
PDF
IRJET- Design of SCADA based Wireless Monitoring and Control
PPTX
Power point presentation on Industrial Automation
lakshit industrial training.pptx of plc and scada
Unit Three.pdfrhykyfgdsfuliuyfgm,i;poiuyrtghkl;ipoiy
Automation with plc & scada
Scada Classification By-Rahul Mehra
Automation PLC & SCADA
Choosing a SCADA System for the IIoT Era
6f56821e-94cd-466c-b5a8-1ada720cba68 (1).pdf
Final Presentation
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Security Training
DTS Solution - SCADA Security Solutions
Understanding fiber optic technology for scada
yogesh zodge ( ARTIFICIAL INTELLIGANCE) (1).pptx
2014_NXP_Functional Safety Compliance Throughout the Vehicle with SafeAssure ...
PLCs in diving systems_ a life cycle Presented by Ed Gardyne of Safewell. Man...
Alcohol report
what is Scada in Pipeline Operation .pdf
B43050518
IRJET- Design of SCADA based Wireless Monitoring and Control
Power point presentation on Industrial Automation
Ad

Recently uploaded (20)

PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PDF
Digital Logic Computer Design lecture notes
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
Construction Project Organization Group 2.pptx
PDF
Well-logging-methods_new................
PPTX
Geodesy 1.pptx...............................................
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
Welding lecture in detail for understanding
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
web development for engineering and engineering
PPTX
Internet of Things (IOT) - A guide to understanding
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Arduino robotics embedded978-1-4302-3184-4.pdf
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Digital Logic Computer Design lecture notes
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Construction Project Organization Group 2.pptx
Well-logging-methods_new................
Geodesy 1.pptx...............................................
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Model Code of Practice - Construction Work - 21102022 .pdf
CYBER-CRIMES AND SECURITY A guide to understanding
Welding lecture in detail for understanding
Operating System & Kernel Study Guide-1 - converted.pdf
web development for engineering and engineering
Internet of Things (IOT) - A guide to understanding

Scada Security & Penetration Testing

  • 1. SSCCAADDAA SSeeccuurriittyy SSCCAADDAA SSeeccuurriittyy || AAhhmmeedd SShheerriiff 22001144
  • 2. AAggeennddaa IInndduussttrriiaall CCoonnttrrooll SSyysstteemmss ● WWhhaatt iiss iitt ?? PPLLCC ● DDeeffiinniittiioonnss ● HHooww DDooeess iitt wwoorrkk ?? SSCCAADDAA ● DDeeffiinniittiioonnss ● HHooww DDooeess iitt wwoorrkk ?? SCADA Security | Ahmed Sherif 2014
  • 3. AAggeennddaa ● Some Incidents ● Stuxnet VS PLC ● Security Best Practices SCADA Security | Ahmed Sherif 2014
  • 4. IInndduussttrriiaall CCoonnttrrooll SSyysstteemmss ● Industrial control system (ICS) is a general term that encompasses several types of control systems used in industrial production, including supervisory control and data acquisition (SCADA) systems, distributed control systems (DCS), and other smaller control system configurations such as programmable logic controllers (PLC) often found in the industrial sectors and critical infrastructures. SCADA Security | Ahmed Sherif 2014
  • 5. PPLLCC ● A Programmable Logic Controller, PLC or Programmable Controller is a digital computer used for automation of typically industrial electromechanical processes, such as control of machinery on factory assembly lines, amusement rides, or light fixtures. PLCs are used in many industries and machines SCADA Security | Ahmed Sherif 2014
  • 6. PPLLCC –– HHooww DDooeess iitt WWoorrkk ?? 1. Computer is Connected to PLC unit Through Ethernet, RS-232, RS-485 or RS-422 cabling . 2. The programming software allows entry and editing of the ladder-style logic 3. the program is transferred from a personal computer to the PLC through a programming board which writes the program into a removable chip such as an EEPROM 4. The Program Then Can Be Run and Executed. SCADA Security | Ahmed Sherif 2014
  • 7. PLC – How Does it Work ? 1. Computer is Connected to PLC unit Through Ethernet, RS-232, RS-485 or RS-422 cabling . SCADA Security | Ahmed Sherif 2014
  • 8. PLC – How Does it Work ? 2. The programming software allows entry and editing of the ladder-style logic SCADA Security | Ahmed Sherif 2014
  • 9. PLC – How Does it Work ? 3. the program is transferred from a personal computer to the PLC through a programming board which writes the program into a removable chip such as an EEPROM SCADA Security | Ahmed Sherif 2014
  • 10. PLC – How Does it Work ? 4. The Program Then Can Be Run and Executed. SCADA Security | Ahmed Sherif 2014
  • 11. PLC – Simulation SCADA Security | Ahmed Sherif 2014
  • 12. SCADA SCADA is .... Industrial Control Systems (ICS), commonly referred to as SCADA underlie much of the infrastructure that makes every day life possible in the modern world. SCADA Security | Ahmed Sherif 2014
  • 13. SCADA SSCCAADDAA iiss ........ ● Industrial Control Systems (ICS), commonly referred to as ● SCADA underlie much of the infrastructure that makes every day ● life possible in the modern world. ● Supervisory Control and Data Acquisition SCADA Security | Ahmed Sherif 2014
  • 14. SCADA SCADA is used For .... PPOOWWEERR GGrriiddss SCADA Security | Ahmed Sherif 2014
  • 15. SCADA SSCCAADDAA iiss uusseedd FFoorr ........ PPiippeeLLiinneess SCADA Security | Ahmed Sherif 2014
  • 16. SCADA SSCCAADDAA iiss uusseedd FFoorr ........ IInntteerr-- ccoonnnneecctteedd sseennssoorrss aanndd ccoonnttrroollss uunnddeerr cceennttrraall mmaannaaggeemmeenntt SCADA Security | Ahmed Sherif 2014
  • 17. SCADA SSCCAADDAA iiss uusseedd FFoorr ........ cchheemmiiccaall ppllaanntt,, ppoowweerr ppllaanntt,, mmaannuuffaaccttuurriinngg ffaacciilliittyy SCADA Security | Ahmed Sherif 2014
  • 18. SCADA SSCCAADDAA iiss uusseedd FFoorr ........ IInntteerr-- ccoonnnneecctteedd sseennssoorrss aanndd ccoonnttrroollss uunnddeerr cceennttrraall mmaannaaggeemmeenntt SCADA Security | Ahmed Sherif 2014
  • 19. SCADA SSCCAADDAA iiss uusseedd FFoorr ........ TTrraaffffiicc SSiiggnnaall SCADA Security | Ahmed Sherif 2014
  • 20. HHooww DDooeess SSccaaddaa WWoorrkkss ?? PPhhyyssiiccaall MMeeaassuurreemmeenntt//ccoonnttrrooll eennddppooiinnttss:: ● RTU, PLC ● Measure voltage, adjust valve, flip switch IInntteerrmmeeddiiaattee pprroocceessssiinngg ● Usually based on a commonly used Oses ● *nix, Windows, VMS SCADA Security | Ahmed Sherif 2014
  • 21. HHooww DDooeess SSccaaddaa WWoorrkkss ?? CCoommmmuunniiccaattiioonn IInnffrraassttrruuccttuurree ● Serial, Internet, Wi­fi ● Modbus, DNP3, OPC, ICCP SCADA Security | Ahmed Sherif 2014
  • 22. SCADA Security | Ahmed Sherif 2014
  • 23. Components ooff aa SSCCAADDAA nneettwwoorrkk ● RTU / PLC – Reads information on voltage, flow, the status of switches or valves. Controls pumps, switches, valves ● MTU – Master Terminal Unit – Processes data to send to HMI ● HMI – Human Machine Interface – GUI, Windows – Information traditionally presented in the form of a mimic diagram ● Communication network – LAN, Wireless, Fiber etc etc SCADA Security | Ahmed Sherif 2014
  • 24. PPrroottooccoollss ooff SSccaaddaa NNeettwwoorrkk RRaaww DDaattaa PPrroottooccoollss –– MMooddbbuuss // DDNNPP33 ● For serial radio links mainly, but you can run anything over ● anything these days, especially TCP/IP (for better or worse) ● Reads data (measures voltage / fluid flow etc) ● Sends commands (flips switches, starts pumps) / alerts (it’s ● broken!) HHiigghh LLeevveell DDaattaa PPrroottooccoollss –– IICCCCPP // OOCCPP ● Designed to send data / commands between apps / databases ● Provides info for humans ● These protocols often bridge between office and control ● networks SCADA Security | Ahmed Sherif 2014
  • 25. TTeessttiinngg SSccaaddaa NNeettwwoorrkkss SCADA Security | Ahmed Sherif 2014
  • 26. SSccrriipptt KKiiddddiieess vvss SSccaaddaa SSoommeettiimmeess iitt DDooeessnn''tt rreeqquuiirree HHiigghh SSkkiillllss ccoozz ...... ● TTeennaabbllee hhaass rreelleeaasseedd 3322 pplluugg--iinnss ffoorr NNeessssuuss wwhhiicchh ssppeecciiffiiccaallllyy tteesstt SSCCAADDAA ddeevviicceess ● CCoorree--IImmppaacctt aanndd MMeettaassppllooiitt nnooww iinncclluuddee SSCCAADDAA hhaacckkss ((SSiinnccee AAuugguusstt 22000088)) SCADA Security | Ahmed Sherif 2014
  • 27. SSCCAADDAA ((iinn)) sseeccuurriittyy LLaacckk ooff AAuutthheennttiiccaattiioonn ● I don’t mean lack of strong authentication. I mean NO AUTH!! ● There’s no “users” on an automated system ● OPC on Windows requires anonymous login rights for DCOM ● (XPSP2 breaks SCADA because anonymous DCOM off by ● default) ● Normal policies regarding user management, password rotation ● etc etc do not apply SCADA Security | Ahmed Sherif 2014
  • 28. SSCCAADDAA ((iinn)) sseeccuurriittyy CCaann’’tt PPaattcchh,, WWoonn’’tt ppaattcchh ● SCADA systems traditionally aren’t patched ● Install the system, replace the system a decade later ● Effects of patching a system can be worse than the effects of ● compromise? ● Very large vulnerability window SCADA Security | Ahmed Sherif 2014
  • 29. IInncciiddeennttss !! !! SCADA Security | Ahmed Sherif 2014
  • 30. IInncciiddeennttss !! !! In 2000, in Queensland, Australia. Vitek Boden released millions of liters of Untreated Sewage Into fresh water streams using a wireless laptop. SCADA Security | Ahmed Sherif 2014
  • 31. IInncciiddeennttss !! !! “In August 2003 Slammer infected a private computer network at the idled Davis­Besse nuclear power plant in Oak Harbor, Ohio, disabling a safety monitoring system for nearly five hours.” SCADA Security | Ahmed Sherif 2014
  • 32. IInncciiddeennttss !! !! In 2003, the east coast of America experienced a blackout. While the Blaster worm was not the cause, many related systems were found to be infected SCADA Security | Ahmed Sherif 2014
  • 33. IInncciiddeennttss !! !! In 1997, a teenager broke into NYNEX and cut off Worcester Airport in Massachusetts for 6 hours by affecting ground and air communications SCADA Security | Ahmed Sherif 2014
  • 34. TThhee NNiigghhttmmaarree ....SSttuuxxnneett SCADA Security | Ahmed Sherif 2014
  • 35. TThhee NNiigghhttmmaarree ....SSttuuxxnneett TTaarrggeettss SSccaaddaa NNeettwwoorrkkss ● Siemens Simatic WinCC specifically. UUsseess RRoooottKKiitt tteecchhnnoollooggyy ttoo hhiiddee iittsseellff ● Classic Windows rootkit ● PLC rootkit SSpprreeaaddss vviiaa UUSSBB ssttiicckkss aanndd nneettwwoorrkk sshhaarreess ● Uses 4 Zero-day vulnerabilities SCADA Security | Ahmed Sherif 2014
  • 36. TThhee NNiigghhttmmaarree ....SSttuuxxnneett MMaalliicciioouuss ppaayyllooaadd ssiiggnneedd wwiitthh ssttoolleenn ddiiggiittaall CCeerrttiiffiiccaatteess ● Realtek and Jmicron. IInnffeecctteedd MMaacchhiinneess bbeeccoommee ppaarrtt ooff tthhee SSttuuxxnneett bboottnneett ● Can Steal code,documents, Projects designs . ● Can inject and hide code into PLCs – modifying production processes. SCADA Security | Ahmed Sherif 2014
  • 37. SSttuuxxnneett .... DDeeeeppeerr LLooookk ● MMaaiinn DDrrooppppeerr This section contains the main stuxnet DLL file. And this DLL contains all stuxnet’s functions, mechanisms, files and rootkits. SCADA Security | Ahmed Sherif 2014
  • 38. SSttuuxxnneett .... DDeeeeppeerr LLooookk ● After finding this section, it loads stuxnet DLL file in a special way. 11..EEssccaallaattiinngg tthhee PPrriivviilleeggeess aanndd IInnjjeeccttiinngg IInnttoo aa NNeeww PPrroocceessss.. ● It checks if the configuration data is correct and recent and then it checks the admin rights. If it’s not running on administrator level, it uses one of two zero-day vulnerabilities to escalate the privileges and run in the administrator level. ● CVE-2010-2743(MS-10-073) –Win32K.sys Keyboard Layout Vulnerability ● CVE-xxxx-xxxx(MS-xx-xxx) –Windows Task Scheduler Vulnerability ● These two vulnerabilities allow the worm to escalate the privileges and run in a new ● process (“csrss.exe” in case of Win32K.sys) or as a new task in the Task Scheduler case SCADA Security | Ahmed Sherif 2014
  • 39. SSttuuxxnneett .... DDeeeeppeerr LLooookk 11..EEssccaallaattiinngg tthhee PPrriivviilleeggeess aanndd IInnjjeeccttiinngg IInnttoo aa NNeeww PPrroocceessss.. After everything goes right and the environment is prepared to be infected by stuxnet, it injects itself into another process to install itself from that process. The injection begins by searching for an Antivirus application installed in the machine Depending on the antivirus application (AVP or McAfee or what?), stuxnet chooses the process to inject itself into. If there’s no antivirus program it chooses “lsass.exe” SCADA Security | Ahmed Sherif 2014
  • 40. SSttuuxxnneett .... DDeeeeppeerr LLooookk 22..IInnssttaalllliinngg SSttuuxxnneett iinnttoo tthhee IInnffeecctteedd MMaacchhiinnee.. The Function #16 begins by checking the configuration data and be sure that everything is ready to begin the installation. And also, it checks if the there’s a value in the registry with this name “NTVDM TRACE” in SOFTWAREMicrosoftWindowsCurrentVersionMS-DOS Emulation And then, it checks if this value equal to “19790509”. This special number seems a date “May 9, 1979” and this date has a historical meaning (by Wikipedia) “Habib Elghanian was executed by a firing squad in Tehran sending shock waves through the closely knit Iranian Jewish community” SCADA Security | Ahmed Sherif 2014
  • 41. SSttuuxxnneett .... DDeeeeppeerr LLooookk 33..TThhee UUSSBB DDrriivveess IInnffeeccttiioonn For infecting USB Flash memory, Stuxnet creates a new hidden window “AFX64c313” and get notified of any new USB flash memory inserted to the computer by waiting for “WM_DEVICECHANGE” Windows Message. ● After getting notified of a new drive added to the computer (USB Flash Memory), stuxnet writes 6 files into the flash memory drive: ● Copy of Shortcut to.lnk ● Copy of Copy of Shortcut to.lnk ● Copy of Copy of Copy of Shortcut to.lnk ● Copy of Copy of Copy of Copy of Shortcut to.lnk ● And 2 executable files (DLL files): ● ~WTR4141.tmp ● ~WTR4132.tmp These malformed shortcut files use vulnerability in Windows Shell named: ● CVE-2010-2568(MS-10-046) -Windows Shell LNK Vulnerability SCADA Security | Ahmed Sherif 2014
  • 42. WWaass iitt aa ssuucccceessss ?? SCADA Security | Ahmed Sherif 2014
  • 43. SSeeccuurriittyy BBeesstt PPrraaccttiicciieess ● Real World Scenario SCADA Security | Ahmed Sherif 2014
  • 44. SSeeccuurriittyy BBeesstt PPrraaccttiicciieess ● Real World Scenario SCADA Security | Ahmed Sherif 2014
  • 45. SSeeccuurriittyy BBeesstt PPrraaccttiicciieess ● Real World Scenario SCADA Security | Ahmed Sherif 2014
  • 46. SSeeccuurriittyy BBeesstt PPrraaccttiicciieess ● Real World Scenario SCADA Security | Ahmed Sherif 2014
  • 47. SSeeccuurriittyy BBeesstt PPrraaccttiicciieess ● Real World Scenario SCADA Security | Ahmed Sherif 2014
  • 48. SSeeccuurriittyy BBeesstt PPrraaccttiicciieess ● Real World Scenario SCADA Security | Ahmed Sherif 2014
  • 49. SSeeccuurriittyy BBeesstt PPrraaccttiicciieess ● Real World Scenario SCADA Security | Ahmed Sherif 2014
  • 50. SSeeccuurriittyy BBeesstt PPrraaccttiicciieess ● Real World Scenario SCADA Security | Ahmed Sherif 2014
  • 51. SShhooddaann && SSCCAADDAA port:161 country:US simatic SCADA Security | Ahmed Sherif 2014
  • 52. SShhooddaann && SSCCAADDAA Python shodan_scan.py user.list pass.list SCADA Security | Ahmed Sherif 2014
  • 53. SSeeccuurriittyy BBeesstt PPrraaccttiicciieess IInnffoorrmmaattiioonn PPrrootteeccttiioonn GGuuiiddeelliinneess:: ● Create strong passwords and protect those passwords. ● Use a security token (or some other additional protection method) with a password to provide much stronger protection than a password alone. ● Take great care in what you publish on the internet and your company intranet. ● Sanitize or destroy all equipment that may contain critical information. ● Follow your company's reporting procedures if you observe any suspicious or abnormal activity. SCADA Security | Ahmed Sherif 2014
  • 54. SSeeccuurriittyy BBeesstt PPrraaccttiicciieess PPhhyyssiiccaall PPrrootteeccttiioonn GGuuiiddeelliinneess:: ● Limit access to systems you're responsible for to those who have a need to know. ● Protect systems and information (use password-protected screen savers, lock office doors, lock information in cabinets, etc.) when leaving them unattended. ● When traveling, pay special attention when going through airport security. Thieves may be able to steal your laptop while you are focusing on getting through the security checkpoint. ● Never leave systems or storage media in your vehicle. ● Protect work systems and information at home at the same level or higher as you would at work. SCADA Security | Ahmed Sherif 2014
  • 55. SSoo,, IIss SSccaaddaa IImmppoorrttaanntt ?? ● No ... ● Why ?! ... SCADA Security | Ahmed Sherif 2014
  • 56. Any Questions ? SCADA Security | Ahmed Sherif 2014