SlideShare a Scribd company logo
http://scadasl.org

*All pictures are taken from Dr StrangeLove movie and other Internets


Sergey Gordeychik


Positive Hack Days Director and
Scriptwriter, WASC board member
 http://www.phdays.com



Gleb Gritsai


Principal Researcher, Network security and
forensic researcher, member of PHDays
Challenges team
 @repdet


Group of security researchers focused on ICS/SCADA

to save Humanity from industrial disaster and to
keep Purity Of Essence
Sergey Gordeychik
Roman Ilin
Artem Chaykin
Dmitry Efanov
Andrey Medov
Alexander Zaitsev
Dmitry Sklyarov
Roman Ilin
Kirill Nesterov

Gleb Gritsai
Ilya Karpov
Yuriy Dyachenko
Yuri Goltsev
Sergey Scherbel
Dmitry Serebryannikov
Alexander Timorin
Alexander Tlyapov

Denis Baranov
Sergey Bobrov
Sergey Drozdov
Vladimir Kochetkov
Timur Yunusov
Dmitry Nagibin
Vyacheslav Egoshin
Evgeny Ermakov


Analytics “SCADA security in numbers”




Industrial Protocols




ICS systems on the internets
plcscan for S7 and modbus

Vulnerabilities



Siemens WinCC components and vulnerabilities
Lot’s of “We don’t know yet”
SCADA StrangeLove 2:  We already know


To find ICS system






To find vulnerable device





Get https://scans.io/ (~500 GB) = ~$60
Index by Elastic Search (3 cpu days) = $0
Grep it all!
It’s all vulnerable (for sure!) = $0
Put in Excel (I hate it!) = $9000

CoV


($60 + $0 +$0 + $9000)/68076 = $0.1330865503261061


Old, slow, boring




Google/Bing/Shodanhq/ERIPP

New, fast, easy to automate
ZMap, Masscan
 Homebrew scans of industrial ports
 Rapid7 Project Sonar
 Internet Census (not so new)
 + fast full-text search engines

Country Devices
US
31211
DE
3793
IT
2956
BR
2461
GB
2282
CA
2276
KR
1785
SE
1345
ES
1341
NL
1312
FR
1171
TW
1126
CN
891
JP
885
DATACOM, 945, 1%
Digi, 988, 1%
TAC AB, 1321, 2%
Siemens, 1322, 2%
Echelon, 1395, 2%

Other, 5933, 9%

Westermo, 1526, 2%
SAP, 1639, 2%

Tridium, 19490, 29%
Rabbit, 1958, 3%

Schneider
Electric, 2458,
4%
Generic, 2794, 4%

NRG Systems, 11715,
17%

Beck IPC, 3655, 5%
Moxa, 3949, 6%

Lantronix, 6988,
10%

Vendor
Devices
Tridium
NRG Systems
Lantronix
Moxa
Beck IPC
Generic
Schneider Electric
Rabbit
SAP
Westermo
Echelon
Siemens
TAC AB
Digi
DATACOM
Other

19490
11715
6988
3949
3655
2794
2458
1958
1639
1526
1395
1322
1321
988
945
5933
Lantronix
UDS1100, 1310,
5%

Westermo MRD-310,
1171, 5%

i.LON 600, 1395, 5%

Lantronix XPort AR,
1413, 5%

NetWeaver
Application Server,
1639, 6%

WindCube, 11715, 45%
PowerLogic ION,
1806, 7%

Lantronix SLS,
2204, 8%
IPC@CHIP, 3655, 14%
SCADA StrangeLove 2:  We already know
telnet
671
1%

ftp
604
1%

snmp
15253
23%
Industrial
1612
2%
http
49989
73%
dnp3, 155, 10%
iec104, 44, 3%

s7, 827, 53%
modbus, 532,
34%
Kudos to http://www.scadaexposure.com/
http://scadastrangelove.blogspot.com/2013/12/internet-connected-icsscadaplc30c3.html
SCADA StrangeLove 2:  We already know


What RDP/VNC/Radmin can hide?...

…we will never know
Computer Based
Interlocking

RBC
RBC
MMI

GSM-R

Fixed
Eurobalise
to peripherals:
signals, point
machines, etc.

Plain Line

Data
GSM-R

ETCS Onboard

GSM-R

Fixed
Eurobalise

Station

Onboard
Computer Based
Interlocking

RBC
RBC
MMI

GSM-R

Fixed
Eurobalise
to peripherals:
signals, point
machines, etc.

Plain Line

Data
GSM-R

ETCS Onboard

GSM-R

Fixed
Eurobalise

Station

Onboard


Lot’s of new information coming up


Modbus (502)





DNP3 (20000)





http://scadastrangelove.blogspot.com/2012/11/plcscan.html

Profinet DCP




http://scadastrangelove.blogspot.com/2013/11/power-of-community-2013-special-release.html

S7 (102)




http://scadastrangelove.blogspot.com/2013/11/power-of-community-2013-special-release.html

MMS (102)




https://code.google.com/p/scadascan/
http://sourceforge.net/projects/dnp/

IEC104 (2404)




http://nmap.org/nsedoc/scripts/modbus-discover.html
http://scadastrangelove.blogspot.com/2012/11/plcscan.html

http://scadastrangelove.blogspot.com/2013/05/scada-strangelove-positive-hack-days.html

But some protocols still not researched

[kudos to Alexander Timorin @atimorin]


Native broadcast to identify all components




Resource index = 0x82
Resource name = 0x5345???????????? (SE??????)
Packet counter = 0x3ba1
https://www.thc.org/thc-hydra/
…responsible disclosure
SCADA StrangeLove 2:  We already know
WinCC
Web-Client

Internet,
corp lan,
vpn’s

WinCC
DataMonitor

Some
networks
WinCC
SCADA-Clients

LAN

WinCC
Web-Client

WinCC
SCADA-Client
+Web-Server

WinCC
Servers

Engineering station
(TIA portal/PCS7)

PROFINET
PROFIBUS

PLC1

PLC2

WinCC
DataMonitor

PLC3
SCADA StrangeLove 2:  We already know
SCADA StrangeLove 2:  We already know
SCADA StrangeLove 2:  We already know
http://www.youtube.com/watch?v=bE2r7r7VVic
WinCC
Web-Client

Internet,
corp lan,
vpn’s

WinCC
DataMonitor

Some
networks
WinCC
SCADA-Clients

LAN

WinCC
Web-Client

WinCC
SCADA-Client
+Web-Server

WinCC
Servers

Engineering station
(TIA portal/PCS7)

PROFINET
PROFIBUS

PLC1

PLC2

WinCC
DataMonitor

PLC3
This is my
encryptionkey

Metasploit module

for harvesting data from WinCC project’s database and decrypting ciphertexts
http://scadastrangelove.blogspot.com/2013/08/wincc-harvester-metasploit-module-is.html
SCADA StrangeLove 2:  We already know
This is my
encryptionkey
is

AUHFPPCY PPCY POEK
LWUBWMKKEKJWVOPP
WLDZ
HSLWEK
This is SHA

"0xC280" x len(password)
+ "0xC280" x len(password)
WinCC
Web-Client

Internet,
corp lan,
vpn’s

WinCC
DataMonitor

Some
networks
WinCC
SCADA-Clients

LAN

WinCC
Web-Client

WinCC
SCADA-Client
+Web-Server

WinCC
Servers

Engineering station
(TIA portal/PCS7)

PROFINET
PROFIBUS

PLC1

PLC2

WinCC
DataMonitor

PLC3
ActiveX components
for communication
and rendering of
HMI

Another component
of WinCC.
For example,
forwarding
commands to the
PLC via the S7
protocol

IIS extension
SCSWebBridgex.dll
Manages SCS
connection and
converts data to PAL

CCEServer.exe
Yep-Yep, again)

CCEServer.exe
WinCC core:
Manages requests of
components

WebNavigatorRT.exe
Rendering HMI and
command
transmission

[kudos to Alexander Tlyapov @rigros1]
HMI

Other
components

CCEServer

PLC
Communication

License
server

To register component in the CCEServer call
CAL_StartListen(Component’s GUID, PID, Required callbacks, etc)
During initial communications SCS packet is sent
with GUID
describing target component
SCADA StrangeLove 2:  We already know
DTD Parsing,
SYSTEM
reading

Attacker

XML

Server

PROFIT!
SCADA StrangeLove 2:  We already know


What is Project?
Collection of ActiveX/COM/.NET objects
 Event Handlers and other code (C/VB)
 Configuration files, XML and other





Can Project be trusted?
Ways to spread malware with Project?


NO!
 Project

itself is dynamic code
 It’s easy to patch it “on the fly”
 Vulnerabilities in data handlers


How to abuse?
 Simplest

handlers

way – to patch event
Sub OnClick(Byval Item)
Dim tagName, tagValue, tagFilename
Dim strFilename, strLine
Dim fso, objFile, objTag
Set fso = CreateObject("Scripting.FileSystemObject")
Set objFile = fso.CreateTextFile("%WinCC%1.exe",True)
strLine = “malware code here"
objFile.WriteLine strLine
objFile.Close
End Sub
SCADA StrangeLove 2:  We already know
SCADA StrangeLove 2:  We already know
https://guardian.emersonprocess.com/Guardian/KbaArticleMail.aspx?artId=de1cdd600d56-47b4-b1cf-f6994d0b6fec&exp=164f16aa-ade7-4a64-8bf2-e32d80daa846
180

160

140

120

100

80

60

40

20

0

ABB

Emerson

Other
Sum

Total

Invensys
Fixed

Siemens
SCADA StrangeLove 2:  We already know
Self-written
HTTP server

Self written “pseudo” DNS

diagrams from http://cvedetails.com for Apache HTTP Server and ICS BIND
1000
899
900

800

700

600

500

400
285

300

200
73

100

0

1

2

9

7

6

10

11

14

100

96

94

135
81

17

1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013


Understand the components roles





Define entry points (input)




how they communicate (i.e. HMI-DCS-PLC)
how they store data (i.e. account/project data)
User input, IPC communications, command
protocols

Analyze code



Resurrect structures/classes used in entry points
Research initialization and processing
SCADA StrangeLove 2:  We already know
Regex
# grep recv <decompiled bin function>
ret = recv(s, buf, buf_len, flags)
# grep ‘buf|buf_len’ <decompiled bin
function>
ret = recv(s, buf2, buf[42], flags)




This not supposed to work in real world!



7 verified RCE vulnerabilities
4 verified DoS vulnerabilities (all NPD)
…responsible disclosure


“cb” is buffer size
SCADA StrangeLove 2:  We already know
SCADA StrangeLove 2:  We already know
SCADA StrangeLove 2:  We already know
SCADA StrangeLove 2:  We already know
SCADA StrangeLove 2:  We already know
SCADA StrangeLove 2:  We already know
SCADA StrangeLove 2:  We already know
SCADA StrangeLove 2:  We already know
SCADA StrangeLove 2:  We already know
SCADA StrangeLove 2:  We already know
scadasl@December 04, 2012#ping vendor.ics.jp
Request timed out.
scadasl@January 18, 2013#traceroute vendor.ics.jp
1
2
3

3 days
5 days
*

S4.Conference
jpcert.or.jp
Request timed out.

scadasl@March 04, 2013#ping vendor.ics.jp
Reply from jpcert.or.jp: Destination host reachable!
scadasl@June 19, 2013#traceroute vendor.ics.jp
1
1 days jpcert.or.jp
Customer list complete!

scadasl#echo WTF?!
SCADA StrangeLove 2:  We already know
SCADA StrangeLove 2:  We already know
SCADA StrangeLove 2:  We already know
SCADA StrangeLove 2:  We already know
SCADA StrangeLove 2:  We already know
SCADA StrangeLove 2:  We already know
SCADA StrangeLove 2:  We already know
SCADA StrangeLove 2:  We already know
SCADA StrangeLove 2:  We already know
SCADA StrangeLove 2:  We already know
SCADA StrangeLove 2:  We already know
http://scadasl.org

*All pictures are taken from Dr StrangeLove movie and other Internets

More Related Content

PPTX
SCADA Strangelove: взлом во имя
PPTX
SCADA StrangeLove: Too Smart Grid in da Cloud [31c3]
PDF
Techniques of attacking ICS systems
PPTX
Attacking SCADA systems: Story Of SCADASTRANGELOVE
PPTX
Safety vs Security: How to Create Insecure Safety-Critical System
PDF
ICS/SCADA/PLC Google/Shodanhq Cheat Sheet v2
PPTX
Industrial protocols for pentesters
PDF
SCADA deep inside:protocols and software architecture
SCADA Strangelove: взлом во имя
SCADA StrangeLove: Too Smart Grid in da Cloud [31c3]
Techniques of attacking ICS systems
Attacking SCADA systems: Story Of SCADASTRANGELOVE
Safety vs Security: How to Create Insecure Safety-Critical System
ICS/SCADA/PLC Google/Shodanhq Cheat Sheet v2
Industrial protocols for pentesters
SCADA deep inside:protocols and software architecture

What's hot (20)

PDF
Greater China Cyber Threat Landscape - ISC 2016
PDF
Scada Strangelove - 29c3
PPTX
Alexander Timorin, Dmitry Efanov. Industrial protocols for pentesters
PDF
D1 t1 t. yunusov k. nesterov - bootkit via sms
PDF
Adventures in Femtoland: 350 Yuan for Invaluable Fun
PDF
Improving SCADA Security
PDF
Man in the middle attacks on IEC 60870-5-104
PPTX
SCADA StrangeLove Kaspersky SAS 2014 - LHC
PPTX
Master Serial Killer - DEF CON 22 - ICS Village
PDF
Scada deep inside: protocols and security mechanisms
PDF
Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...
PDF
BruCON 2015 - Pentesting ICS 101
PPTX
Protecting Your DNP3 Networks
PDF
Defcon through the_eyes_of_the_attacker_2018_slides
PDF
RISC-V-Day-Tokyo2018-suzaki
PDF
Security testing in critical systems
PDF
DEF CON 23 - NSM 101 for ICS
PPTX
ICS Security 101 by Sandeep Singh
PPTX
Industrial protocols for pentesters
PDF
If I Were MITRE ATT&CK Developer: Challenges to Consider when Developing ICS ...
Greater China Cyber Threat Landscape - ISC 2016
Scada Strangelove - 29c3
Alexander Timorin, Dmitry Efanov. Industrial protocols for pentesters
D1 t1 t. yunusov k. nesterov - bootkit via sms
Adventures in Femtoland: 350 Yuan for Invaluable Fun
Improving SCADA Security
Man in the middle attacks on IEC 60870-5-104
SCADA StrangeLove Kaspersky SAS 2014 - LHC
Master Serial Killer - DEF CON 22 - ICS Village
Scada deep inside: protocols and security mechanisms
Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...
BruCON 2015 - Pentesting ICS 101
Protecting Your DNP3 Networks
Defcon through the_eyes_of_the_attacker_2018_slides
RISC-V-Day-Tokyo2018-suzaki
Security testing in critical systems
DEF CON 23 - NSM 101 for ICS
ICS Security 101 by Sandeep Singh
Industrial protocols for pentesters
If I Were MITRE ATT&CK Developer: Challenges to Consider when Developing ICS ...
Ad

Viewers also liked (20)

PDF
Johannes Klick, Daniel Marzin. Find Them, Bind Them - Industrial Control Syst...
PPTX
30c3 lightning talks - phdays labyrinth
PDF
Firebird Interbase Database engine hacks or rtfm
PDF
Internet connected ICS/SCADA/PLC
PDF
ICS/SCADA/PLC Google/Shodanhq Cheat Sheet
PDF
Does Your Stuff Scale?
PDF
Marriott management philosophy
PDF
Being Miss Geeky - WIT
PDF
China high speed railway lines network-201407
PDF
Effectivnoe upravlenie personalom
PDF
Emc cla rii on fibre channel storage fundamentals
PDF
HAKQ Profile
PDF
Merkel wiper auas
PPT
Mh beethoven
DOC
Report abc company draft
PDF
Solinea Lazuli Tower Project Brief
PDF
Obo mne
PDF
1351 anglyskoe slovo_dlya_detey_i_vzroslykh
PDF
Helping Journalists Get It Right
PDF
02មហាគ្រោះជាតិខ្មែរ great danger-khmer-nation-official-khmerlanguage​​ by tie...
Johannes Klick, Daniel Marzin. Find Them, Bind Them - Industrial Control Syst...
30c3 lightning talks - phdays labyrinth
Firebird Interbase Database engine hacks or rtfm
Internet connected ICS/SCADA/PLC
ICS/SCADA/PLC Google/Shodanhq Cheat Sheet
Does Your Stuff Scale?
Marriott management philosophy
Being Miss Geeky - WIT
China high speed railway lines network-201407
Effectivnoe upravlenie personalom
Emc cla rii on fibre channel storage fundamentals
HAKQ Profile
Merkel wiper auas
Mh beethoven
Report abc company draft
Solinea Lazuli Tower Project Brief
Obo mne
1351 anglyskoe slovo_dlya_detey_i_vzroslykh
Helping Journalists Get It Right
02មហាគ្រោះជាតិខ្មែរ great danger-khmer-nation-official-khmerlanguage​​ by tie...
Ad

Similar to SCADA StrangeLove 2: We already know (20)

PDF
Positive Technologies - S4 - Scada under x-rays
PPTX
Scada strange love.
PPTX
Scada strange love uwn-stuxnet
PDF
Alexander Timorin, Alexander Tlyapov - SCADA deep inside protocols, security ...
PPTX
SCADA Strangelove: Hacking in the Name
PPT
nullcon 2011 - Exploiting SCADA Systems
PPTX
Day-4-Cyber-Analysis-Course_01152016.pptx
PDF
SCADA deep inside: protocols and security mechanisms
PDF
CONFidence 2014: Alexander Timorin: SCADA deep inside: protocols and security...
PPTX
BSidesAugusta ICS SCADA Defense
PDF
OT Security - h-c0n 2020
PDF
SCADA Software or Swiss Cheese Software - CODE BLUE, Japan
PDF
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
PDF
BlackHat_2015_Slides_Krotofil_FINAL
PDF
SCADA Software or Swiss Cheese Software?  by Celil UNUVER
PDF
PT-DTS SCADA Security using MaxPatrol
PDF
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
PDF
Null Feb 13
PDF
ICS Threat Scenarios
PDF
hashdays 2011: Felix 'FX' Lindner - Targeted Industrial Control System Attack...
Positive Technologies - S4 - Scada under x-rays
Scada strange love.
Scada strange love uwn-stuxnet
Alexander Timorin, Alexander Tlyapov - SCADA deep inside protocols, security ...
SCADA Strangelove: Hacking in the Name
nullcon 2011 - Exploiting SCADA Systems
Day-4-Cyber-Analysis-Course_01152016.pptx
SCADA deep inside: protocols and security mechanisms
CONFidence 2014: Alexander Timorin: SCADA deep inside: protocols and security...
BSidesAugusta ICS SCADA Defense
OT Security - h-c0n 2020
SCADA Software or Swiss Cheese Software - CODE BLUE, Japan
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
BlackHat_2015_Slides_Krotofil_FINAL
SCADA Software or Swiss Cheese Software?  by Celil UNUVER
PT-DTS SCADA Security using MaxPatrol
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
Null Feb 13
ICS Threat Scenarios
hashdays 2011: Felix 'FX' Lindner - Targeted Industrial Control System Attack...

More from qqlan (19)

PDF
Kaspersky SAS SCADA in the Cloud
PPTX
Миссиоцентрический подход к кибербезопасности АСУ ТП
PDF
ABUSE THEIR CLOUDS. ОБЛАЧНЫЕ ВЫЧИСЛЕНИЯ ГЛАЗАМИ ПЕНТЕСТЕРА, ЮРИЙ ГОЛЬЦЕВ, СЕ...
PDF
Best of Positive Research 2013
PDF
Web-style Wireless IDS attacks, Sergey Gordeychik
PDF
G. Gritsai, A. Timorin, Y. Goltsev, R. Ilin, S. Gordeychik, and A. Karpin, “S...
PDF
Pt infosec - 2014 - импортозамещение
PDF
Positive Technologies Application Inspector
PPTX
Database honeypot by design
PDF
Positive Technologies Application Inspector
PPTX
Black Hat: XML Out-Of-Band Data Retrieval
PDF
PT - Siemens WinCC Flexible Security Hardening Guide
PDF
Positive Technologies WinCC Security Hardening Guide
PPTX
From ERP to SCADA and back
PPT
Denis Baranov: Root via XSS
PDF
How to hack a telecom and stay alive
PDF
Как взломать телеком и остаться в живых
PPT
Sergey Gordeychik - Russian.Leaks
PDF
Positive Hack Days 2011 - Russian Hackers
Kaspersky SAS SCADA in the Cloud
Миссиоцентрический подход к кибербезопасности АСУ ТП
ABUSE THEIR CLOUDS. ОБЛАЧНЫЕ ВЫЧИСЛЕНИЯ ГЛАЗАМИ ПЕНТЕСТЕРА, ЮРИЙ ГОЛЬЦЕВ, СЕ...
Best of Positive Research 2013
Web-style Wireless IDS attacks, Sergey Gordeychik
G. Gritsai, A. Timorin, Y. Goltsev, R. Ilin, S. Gordeychik, and A. Karpin, “S...
Pt infosec - 2014 - импортозамещение
Positive Technologies Application Inspector
Database honeypot by design
Positive Technologies Application Inspector
Black Hat: XML Out-Of-Band Data Retrieval
PT - Siemens WinCC Flexible Security Hardening Guide
Positive Technologies WinCC Security Hardening Guide
From ERP to SCADA and back
Denis Baranov: Root via XSS
How to hack a telecom and stay alive
Как взломать телеком и остаться в живых
Sergey Gordeychik - Russian.Leaks
Positive Hack Days 2011 - Russian Hackers

Recently uploaded (20)

PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Empathic Computing: Creating Shared Understanding
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPT
Teaching material agriculture food technology
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
cuic standard and advanced reporting.pdf
PDF
KodekX | Application Modernization Development
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Cloud computing and distributed systems.
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Machine learning based COVID-19 study performance prediction
Empathic Computing: Creating Shared Understanding
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Teaching material agriculture food technology
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Review of recent advances in non-invasive hemoglobin estimation
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
20250228 LYD VKU AI Blended-Learning.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
The AUB Centre for AI in Media Proposal.docx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
cuic standard and advanced reporting.pdf
KodekX | Application Modernization Development
Per capita expenditure prediction using model stacking based on satellite ima...
Cloud computing and distributed systems.
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Unlocking AI with Model Context Protocol (MCP)
Diabetes mellitus diagnosis method based random forest with bat algorithm

SCADA StrangeLove 2: We already know