CPH:SEC CTF-Notes - Hackers Resources Galore
  • ADcheatsheet
  • Project tree
  • RTFnotes
  • WindowsRedTeamCheatSheet
  • How to pass the OSCP
  • Kerberos cheatsheet
  • Privilege Escalation & Post-Exploitation
  • Awesome-Hacking-Resources
    • Contribution Guidelines
    • Awesome Hacking Tools
  • Notes VA
    • Exploitation Cheat Sheet
    • Initial Enumeration
    • Linux Privilege Escalation
    • PenetrationTestingToolsCheatSheet
    • Web Enumeration
    • Windows Privilege Escalation
    • emailgrab
    • linux_priv_esc
    • openredirect
    • 24x7x365 SUPPORT http://www.captiongenerator.com/320492/Offsec-Student-Admins
    • oscp_playlist
    • Privilege Escalation & Post-Exploitation
    • smb_enum
    • whois-file-transfer
    • Windows / Linux Local Privilege Escalation Workshop
  • OSCP-Materials
  • SCADA PLC ICS Pentest PDFs
    • PLClinks
  • Web-CTF-Cheatsheet
  • audio
    • Decode SSTV
    • Spectrogram
  • binary-exploitation
    • Binary Exploitation with Buffer Overflow
    • Exploitation
    • Binary Exploitation with Format String
    • GOT Overriding
    • Exploitation
    • Binary Exploitation with Race Conditions
    • Binary Exploitation with Time Guessing
    • Exploitation
    • Binary Exploitation with ret2plt
    • Pwntools Cheat Sheet
    • Binary Exploitation
  • blockchain
    • Blockchain Pentesting
    • Interact with Ethereum using Foundry
    • Interact with Ethereum using Python
    • smart-contract
      • Ethereum Remix Extension in VS Code
      • Solidity Assembly
      • Create a Contract for Recovery Address
      • Explicit Conversion
      • Solidity Delegatecall Attack
      • DoS with Assembly Invalid Function
      • Solidity Overflow & Underflow
      • Create a Malicious Contract
      • Create a Malicious Contract for Destructing Contract
      • Create an Attack Contract
      • Solidity Storage Values Analysis
      • Inappropriate User Authorization
      • Web3.js Cheat Sheet
  • database
    • CouchDB Pentesting
    • InfluxDB Pentesting
    • MSSQL (Microsoft SQL) Pentesting
    • MongoDB Pentesting
    • MySQL Pentesting
    • Neo4j Pentesting
    • PostgreSQL Pentesting
    • Redis Pentesting
    • SQLite Pentesting
  • dns
    • DNS (Domain Name Systems) Pentesting
    • Enumeration
    • Subdomain Takeover
  • email
    • IMAP (Internet Message Access Protocol) Pentesting
    • POP (Post Office Protocol) Pentesting
    • Exploit DNS Zone Misconfiguration & BIND Config
    • SMTP (Simple Mail Transfer Protocol) Pentesting
  • game
    • FEN Manipulation
    • Minecraft Server Pentesting
    • WebAssembly Games Hacking
  • hardware
    • Firmware Analysis
    • Gerber Viewer
    • MQTT Pentesting
    • NETGEAR Pentesting
    • SAL Logic Analysis
    • linux
      • archive
        • 7z
        • Bzip2 & Bunzip2
        • Crack Zip Password
        • Gzip & Gunzip
        • Tar
        • Zip & Unzip
      • attack
        • Warning
      • backup
        • Extract Archives
      • container
        • Basic Flow
      • management
        • Add & Delete Groups in Linux
        • Add & Delete Users in Linux
        • File Transfer in Linux
        • File & Directory Ownership in Linux
        • File & Directory Permission in Linux
        • Shell Scripting
      • post-exploitation
        • Linux Backdoors
        • Linux Pivoting
      • privilege-escalation
        • Ansible Playbook Privilege Escalation
        • Apache Conf Privilege Escalation
        • Bash eq Privilege Escalation
        • Buffer Overflow Privilege Escalation
        • Chrome Remote Debugger Pentesting
        • Exploitation
        • Command Execution
        • Extract Passwords from Firefox Profile
        • OpenSSL Privilege Escalation
        • Exploitation
        • PolKit Privilege Escalation
        • Python Eval Code Execution
        • Python Jails Escape
        • Python Privilege Escalation
        • Python Yaml Privilege Escalation
        • Remote Code Execution with YAML
        • Reverse Shell
        • Find Credentials
        • Shared Library Hijacking
        • dirty_sock (CVE-2019-7304) Version < 2.37
        • Tar Wildcard Injection PrivEsc
        • Update-Motd Privilege Escalation
        • Linux Privilege Escalation
        • Exploitation
        • doas
          • Investigation
        • sudo
          • Sudo ClamAV Privilege Escalation
          • Sudo Dstat Privilege Escalation
          • Sudo Exiftool Privilege Escalation
          • Sudo Fail2ban Privilege Escalation
          • Sudo Git Privilege Escalation
          • Sudo Java Privilege Escalation
          • Sudo OpenVPN Privilege Escalation
          • Sudo Path Traversal Privilege Escalation
          • LD_PRELOAD, LD_LIBRARY_PATH Overwriting
          • Sudo Reboot Privilege Escalation
          • Sudo Screen Privilege Escalation
          • Sudo Service Privilege Escalation
          • Sudo Shutdown, Poweroff Privilege Escalation
          • Sudo Systemctl Privilege Escalation
          • Sudo Tee Privilege Escalation
          • Sudo Umount Privilege Escalation
          • Sudo Vim Privilege Escalation
          • Sudo Wall Privilege Escalation
          • Sudo Wget Privilege Escalation
          • Sudoedit Privilege Escalation
          • Sudo Privilege Escalation
      • protocol
        • Enumeration
  • machine-learning
    • Jupyter Notebook Pentesting
    • Orange Data Mining
    • Read HDF5 (H5) File
    • Load Model from PT
    • Read QASM
    • computer-vision
      • Image Analysis for Machine Learning
      • Swapping Pixels
      • Image Recognition Bypass for Machine Learning
    • data-processing
      • Find Optimal Number of Clusters
      • Data Manipulation for Machine Learning
      • PCA (Principal Component Analysis)
    • llm
      • Automation
      • LLM Prompt Injection
    • model
      • Adversarial Attack with FGSM (Fast Gradient Signed Method)
      • ML Model Analysis
      • Model Inversion Attack
  • malware
    • Online Scanner
    • Create Macro to Code Execution
    • Static Analysis
    • Malware Analysis
    • Checking Established Network
    • Malware Dynamic Analysis with REMnux
    • Malware Static Analysis
    • NPM Supply Chain Attack
    • Example
    • Splunk Pentesting
  • memory
    • Memory Forensics
  • misc
    • Brainfuck
    • Regular Expressions (Regex/RegExp)
  • network
    • ARP (Address Resolution Protocol) Spoofing
    • Apache Hadoop Pentesting
    • Enumeration
    • FastCGI Pentesting
    • Firewall
    • Honeypots
    • Attack Flow
    • Network Traffic Analysis (NTA)
    • Networking
    • ReDoS (Regular Expression Denial of Service)
    • Rsync Pentesting
    • Tor
    • Connect with grpcui
    • attack
      • Exploitation using Metasploit
      • Anonymize Traffic with Tor
      • DoS/DDoS Attack
    • bluetooth
      • BlueBorne
    • port-forwarding
      • Port Forwarding with Chisel
      • Reverse Connection
      • Port Forwarding with SSH
      • Port Forwarding with Socat
    • protocol
      • Enumeration
      • FTP (File Transfer Protocol) Pentesting
      • Enumeration
      • Communication
      • Enumeration
      • NFS (Network File System) Pentesting
      • Enumeration
      • Enumeration
      • RTSP (Real Time Streaming Protocol) Pentesting
      • Restricted Shell (rbash, rzsh) Bypass
      • SNMP (Simple Network Management Protocol) Pentesting
      • SSH (Secure Shell) Pentesting
      • TFTP (Trivial File Transfer Protocol) Pentesting
      • Telnet Pentesting
      • Enumeration
      • VNC (Virtual Network Computing) Pentesting
      • Connect
    • tool
      • Convert PuTTY Key to OpenSSH Key
      • Tshark Cheat Sheet
      • Wireshark Cheat Sheet
    • vpn
      • Enumeration
      • OpenVPN Troubleshooting
    • wifi
      • Exploitation
      • MITM (Man in the Middle) Attack
      • WiFi Hacking
      • WiFi Password Recovery
  • penbook
    • Active Directory mapping
    • Active information gathering
    • Arp-spoofing - Sniffing traffic
    • Attacking the user
    • Automated Vulnerability Scanners
    • Bash-scripting
    • Basics
    • Basics of linux
    • Basics of windows
    • The Basics of Assembly
    • Binary exploits
    • Broken Authentication or Session Management
    • Browser vulnerabilities
    • Buffer overflow (BOF)
    • Bypass File Upload Filtering
    • Bypassing antivirus
    • physical_access_to_machine
      • rubber-ducky
    • writeups
      • NSM hack challenge
      • SANS Holiday Hack 2016 - chris
      • vulnhub
        • kioptrix 1
        • kioptrix 2 (level 1.1)
        • Quaoar - written by chris
  • printer
    • IPP (Internet Printing Protocol) Pentesting
    • Raw Printing Pentesting
  • python-pty-shells
    • LICENCE
  • reconnaissance
    • Email Analysis
  • container
    • docker
      • Docker Engine API Pentesting
      • Docker Escape
      • Docker Registry Pentesting
      • Directory Traversal & Arbitrary Command Execution (CVE-2021-41091 )
      • Docker Pentesting
    • kubernetes
      • Kubernetes Pentesting
      • MicroK8s Pentesting
  • cryptography
    • algorithm
      • AES-CBC Bit Flipping Attack
      • PadBuster
      • AES-ECB Padding Attack
      • AES (Advanced Encryption Standard)
      • Decryption
      • Online Tools
      • Base32, Base64
      • Online Tools
      • Decrypt
      • Certificates
      • DES (Data Encryption Standard)
      • Diffie-Hellman Key Exchange
      • ECC (Elliptic Curve Cryptography)
      • ECDSA in Python
      • Decrypt
      • GPG (GNU Privacy Guard)
      • HMAC
      • KDBX Files
      • Exploitation
      • MD4, MD5
      • Online Tools
      • NTLM, NTLMv2
      • Decrypt
      • PGP (Pretty Good Privacy)
      • Decrypt
      • Decrypt
      • Decrypt
      • ROT13, ROT47
      • RPNG (Pseudo Random Number Generator) Guessing
      • RSA (Rivest Shamir Adleman)
      • Sample Attacks
      • SHA1, SHA256, SHA512
  • mobile
    • android
      • Android Pentesting
      • Connect to Android Device from PC using SSH
Powered by GitBook
On this page
  1. SCADA PLC ICS Pentest PDFs

PLClinks

From: https://gbhackers.com/industrial-control-system-ics-security/

https://ics-cert.us-cert.gov/Training-Available-Through-ICS-CERT https://techincidents.com/ethical-hacking-and-penetration-testing/ https://electricalschool.org/ https://gbhackers.com/ics-scada-attacks/ https://cset.inl.gov/SitePages/Home.aspx https://www.digitalbond.com/tools/basecamp/3s-codesys/ https://github.com/digitalbond/Redpoint https://github.com/iadgov/GRASSMARLIN https://github.com/sourceperl/mbtget https://github.com/scy-phy/minicps https://github.com/enddo/smod http://modbuspal.sourceforge.net/ https://github.com/moki-ics/modscan https://sourceforge.net/projects/nettoplcsim/ https://www.automatak.com/opendnp3/ https://github.com/SCADACS/PLCinject https://github.com/yanlinlin82/plcscan https://www.digitalbond.com/tools/quickdraw/download/ https://github.com/0xICF/SCADAShutdownTool http://snap7.sourceforge.net/ https://github.com/hslatman/awesome-industrial-control-system-security/blob/master/source/s7-cracker.py https://github.com/hslatman/awesome-industrial-control-system-security/blob/master/source/s7-brute-offline.py https://splone.com/splonebox/ https://www.wireshark.org/ https://github.com/hslatman/awesome-industrial-control-system-security#distributions https://github.com/moki-ics/moki http://www.samuraistfu.org/ https://github.com/hslatman/awesome-industrial-control-system-security#honeypots https://github.com/mushorg/conpot https://github.com/sjhilt/GasPot https://dtag-dev-sec.github.io/mediator/feature/2016/03/11/t-pot-16.03.html https://github.com/hslatman/awesome-industrial-control-system-security#data http://www.netresec.com/?page=PCAP4SICS https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20villages/DEF%20CON%2023%20ics%20village/DEF%20CON%2023%20ICS%20Village%20packet%20captures.rar https://icsmap.shodan.io/ https://ics-radar.shodan.io/ https://www.digitalbond.com/s4/s4x15-week/s4x15-ics-village/ https://sourceforge.net/projects/s7commwireshark/files/Sample-captures/ https://github.com/scadastrangelove/SCADAPASS https://github.com/ICSrepo/TRISIS-TRITON-HATMAN https://github.com/hslatman/awesome-industrial-control-system-security#feeds-and-news https://ics-cert.us-cert.gov/alerts https://ics-cert.us-cert.gov/xml/rss.xml http://www.industry.siemens.com/topics/global/en/industrial-security/news-alerts/pages/alerts.aspx http://www.nerc.com/pa/rrm/bpsa/Pages/Alerts.aspx http://new.abb.com/about/technology/cyber-security/alerts-and-notifications http://software.schneider-electric.com/support/cyber-security-updates/ https://github.com/hslatman/awesome-industrial-control-system-security#conferences-and-conference-material https://cs3sthlm.se/ https://cs3sthlm.se/ http://ics.sans.org/ics-library/summit-archives http://www.icscybersecurityconference.com/ https://github.com/hslatman/awesome-industrial-control-system-security#literature https://scadahacker.com/library/index.html http://www.amazon.com/Applied-Cyber-Security-Smart-Grid/dp/1597499986/ http://www.robertmlee.org/a-collection-of-resources-for-getting-started-in-icsscada-cybersecurity/ https://documents.trendmicro.com/assets/wp/wp-hacker-machine-interface.pdf https://www.amazon.com/Handbook-Control-Systems-Security-Second/dp/1498717071/ref=sr_1_5?s=books&ie=UTF8&qid=1472416488&sr=1-5&keywords=scada+security http://www.isaca.org/Journal/archives/2014/Volume-1/Documents/SCADA-Cybersecurity-Framework_joa_Eng_0114.pdf http://www.amazon.com/Industrial-Network-Security-Second-Edition/dp/0124201148/ref=sr_1_3?ie=UTF8&qid=1414970315&sr=8-3&keywords=industrial+network+security http://www.amazon.com/Powhttps://gbhackers.com/privacy-policy/ er-System-SCADA-Smart-Grids/dp/148222674X http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-82r2.pdf https://www.sans.org/reading-room/whitepapers/ICS/industrial-control-system-cyber-kill-chain-36297 https://ics.sans.org/media/An-Abbreviated-History-of-Automation-and-ICS-Cybersecurity.pdf http://www.controleng.com/networking-security/cyber-security.html https://github.com/hslatman/awesome-industrial-control-system-security#introduction-to-ics-scada--plcs http://plc-training.org/plc-network-to-hmi-scada.html https://www.youtube.com/watch?v=VQLRVjEFRGI https://www.youtube.com/watch?v=vv2CoTiaWPI https://www.youtube.com/user/ControlLectures https://www.youtube.com/user/plcprofessor https://www.youtube.com/watch?v=2DQdEHvnqvI https://www.youtube.com/watch?v=OvRD2UvrHjE https://www.youtube.com/watch?v=8FYFai21JPA https://www.youtube.com/watch?v=E1nsgukeKKA https://www.youtube.com/watch?v=DL_zIjhCEpU https://gbhackers.com/industrial-control-system-ics-security/?share=facebook https://gbhackers.com/industrial-control-system-ics-security/?share=linkedin https://gbhackers.com/industrial-control-system-ics-security/?share=twitter https://gbhackers.com/industrial-control-system-ics-security/?share=google-plus-1 https://gbhackers.com/industrial-control-system-ics-security/?share=pinterest https://gbhackers.com/industrial-control-system-ics-security/?share=telegram https://gbhackers.com/industrial-control-system-ics-security/?share=reddit https://api.whatsapp.com/send?text=Most%20Important%20Industrial%20Control%20System%20%28ICS%29%20Security%20Resources%20and%20Tools%20for%20Security%20Professionals%20https%3A%2F%2Fgbhackers.com%2Findustrial-control-system-ics-security%2F https://github.com/hslatman/awesome-industrial-control-system-security https://gbhackers.com/tag/ics/ https://gbhackers.com/tag/industrial-control-system/ https://gbhackers.com/cyber-threat-intelligence-tools/ h https://www.facebook.com/sharer.php?u=https%3A%2F%2Fgbhackers.com%2Findustrial-control-system-ics-security%2F&t=Most+Important+Industrial+Control+System+%28ICS%29+Security+Resources+and+Tools+for+Security+Professionals https://twitter.com/intent/tweet?text=Most+Important+Industrial+Control+System+%28ICS%29+Security+Resources+and+Tools+for+Security+Professionals&url=https%3A%2F%2Fgbhackers.com%2Findustrial-control-system-ics-security%2F https://plus.google.com/share?url=https%3A%2F%2Fgbhackers.com%2Findustrial-control-system-ics-security%2F https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fgbhackers.com%2Findustrial-control-system-ics-security%2F&title=Most+Important+Industrial+Control+System+%28ICS%29+Security+Resources+and+Tools+for+Security+Professionals&source=https://gbhackers.com/ https://pinterest.com/pin/create/bookmarklet/?url=https%3A%2F%2Fgbhackers.com%2Findustrial-control-system-ics-security%2F&media=https://i1.wp.com/gbhackers.com/wp-content/uploads/2018/04/0SSi51524511287.png?fit=980%2C677&ssl=1&description=Most+Important+Industrial+Control+System+%28ICS%29+Security+Resources+and+Tools+for+Security+Professionals

PreviousSCADA PLC ICS Pentest PDFsNextWeb-CTF-Cheatsheet

Last updated 2 years ago