preview

An Report On An Industrial Control System

Decent Essays

An industrial control system (ICS) includes the devices and systems that are used to manage industrial production and operation. ICSs include systems that monitor different types of utilities, such as gas, electrical, water, and sewage (Chapple & Seidl, 2015, p. 243). The ICSs are an attractive target for an APT because damaging or destroying an ICS can have a crippling effect on a wide region. To counteract the malicious goal of the enemy and protect its resources and weapons, the military often utilizes a Kill Chain, sometimes referred to as a kinetic Kill Chain. The concept of a Kill Chain is best described as a series of steps that involves finding a target, tracking it, and eventually attacking it with the intent to either damage or …show more content…

He can do it by looking for publicly available information on the Internet.” (p. 1). The APT probably used Active Reconnaissance to gather information about the computers connected to the power plant network. It amassed useful information by using common Internet tools and services. By using port scans, the APT was able to discover the ports that were opened on the servers, which subsequently revealed the services that were running on the servers. At that point, the APT could have attacked the vulnerable ports to gain access to the computer systems.
The APT also might have taken advantage of the Passive Reconnaissance techniques to attack its target. By using tools, such as NSLOOKUP, TRACERT and WHOIS database, the APT could have gathered information about the domain names, computer names, IP addresses, DNS resource records, host names, SMTP servers, and Web servers. Once the APT had gathered all the data, it could have used more advance tools like NMAP. Tools such as NMAP allow the use of TCP fingerprinting, which could have led to the discovery of the operating systems that were running on computers at the power plant. The APT could have also used TELNET, FTP and HTTP to gain information about the Web servers, browsers, plugins, etc. With information on operating systems, open vulnerable ports, and the services at its disposal, the APT could have launched a DDoS, buffer overflow exploits, and other attacks against the target.
The first step in the Cyber Kill Chain is

Get Access