SlideShare a Scribd company logo
WHITE PAPER
Vulnerabilities on
the Wire: Mitigations
for Insecure ICS Device
Communication
Michael Hoffman
Copyright SANS Institute 2021. Author Retains Full Rights.
This paper was published by SANS Institute. Reposting is not permitted without express written permission.
©
2
0
2
0
T
h
e
S
A
N
S
I
n
s
t
i
t
u
t
e
,
A
u
t
h
o
r
R
e
t
a
i
n
s
F
u
l
l
R
i
g
h
t
s
© 2020 The SANS Institute Author retainsfull rights.
Vulnerabilities on the Wire:
Mitigations for Insecure ICS Device Communication
GIAC (GRID) Gold Certification
Author: Michael Hoffman, mjhoffman80@gmail.com
Advisor: David Fletcher
Accepted: 2/6/2020
Abstract
Modbus TCP and other legacy ICS protocols ported over from serial communications are
still widely used in many ICS verticals. Due to extended operational ICS component life,
these protocols will be used for many years to come. Insecure ICS protocols allow
attackers to potentially manipulate PLC code and logic values that could lead to disrupted
critical system operations. These protocols are susceptible to replay attacks and
unauthenticated command execution (Bodungen, Singer, Shbeeb, Hilt, & Wilhoit, 2017).
This paper examines the viability of deploying PLC configuration modifications,
programming best practices, and network security controls to demonstrate that it is
possible to increase the difficulty for attackers to maliciously abuse ICS devices and
mitigate the effects of attacks based on insecure ICS protocols. Student kits provided in
SANS ICS515 and ICS612 courses form the backdrop for testing and evaluation of ICS
protocols and device configurations.
@ 2021 SANS Institute Author Retains Full Rights
©
2
0
2
0
T
h
e
S
A
N
S
I
n
s
t
i
t
u
t
e
,
A
u
t
h
o
r
R
e
t
a
i
n
s
F
u
l
l
R
i
g
h
t
s
© 2020 The SANS Institute Author retainsfull rights.
Mitigating Vulnerable ICS Protocols 2
	
Michael	Hoffman,	mjhoffman80@gmail.com	
	 	
1. Introduction
Modbus, an industrial protocol used for server to client communication, has been
used for over 40 years and is still widely deployed in new ICS installations (Mostia,
2019). Modbus can be transported over serial mediums of RS232, RS485, or it can be
wrapped in an IEEE 802.3 TCP segment. Within TCP, the typical implementation is
Modbus Remote Terminal Unit (RTU) contained in the TCP/IP stack Application layer,
which can be easily viewed in Wireshark (Sanchez, 2017). Modbus uses simple function
calls combined with data range requests to read and write bits, called coils. Additionally,
it can also read and write integers or floats, called registers. When engineers were
encapsulating Modbus within TCP, cybersecurity concerns were nonexistent and,
therefore, Modbus RTU does not have any built-in security mechanisms (Rinaldi, n.d.).
From an ICS security perspective, Modbus is rife with many vulnerabilities and is subject
to Probe, Scan, Flood, Authentication Bypass, Spoof, Eavesdrop, Misdirect, Read/Copy,
Terminate, Execute, Modify, and Delete attacks (Draias, Serhrouchni, & Vogel, 2015)
1.1. Where Insecure ICS Protocols are Commonly Found
In an ICS environment, the Modbus TCP protocol is often found near the physical
processes. As shown in Figure 1, advanced field devices at level 0, such as mass flow
meters and analytical instrumentation, may have Modbus TCP capability.
Figure 1. ICS zone segmentation (CSIA, 2016)
@ 2021 SANS Institute Author Retains Full Rights
©
2
0
2
0
T
h
e
S
A
N
S
I
n
s
t
i
t
u
t
e
,
A
u
t
h
o
r
R
e
t
a
i
n
s
F
u
l
l
R
i
g
h
t
s
© 2020 The SANS Institute Author retainsfull rights.
Mitigating Vulnerable ICS Protocols 3
	
Michael	Hoffman,	mjhoffman80@gmail.com	
	 	
Programmable Logic Controllers (PLCs) or RTUs comprise functional level 1, where
they are used as masters or slaves based on the Modbus communication hierarchy. These
devices normally house the logic that controls the physical process. Supervisory Control
and Data Acquisition (SCADA), master stations, or communication gateways, such as
Modbus to Open Platform Communication (OPC) servers, comprise functional level 2
and provide oversight and input to lower-level devices. Therefore, Modbus covers IEC
62443 functional layers 0 to 2 (CSIA, 2016).
1.2. ICS Attacks Leveraging Insecure Protocols
Although the Modbus protocol is plagued with many vulnerabilities and is easy to
exploit on its own, the difficulty in carrying out attacks on ICS systems lies within the
loose relationship between Modbus data and the ICS device logic and programming.
Modbus does not associate data with an information model as other protocols or
frameworks do (OPC Foundation, 2020). For instance, the values at coil 50 or register
120 could be implemented entirely differently between two PLCs mounted side-by-side
in a control panel. It depends on the developed logic and association between Modbus
mapping tables. Therefore, without viewing a project file, PLC program, or HMI screen,
limited contextual information is available to an attacker without significant dwell time in
the ICS environment to watch and learn. Modbus registers can represent a range of
process or control variables. These may include tank level, flow rate, temperature,
pressure, voltage, setpoint, or control output. Modbus coils, on the other hand, offer less
context and are more difficult to decipher: a value of 0 or 1, for example, could indicate
pump status, breaker position, valve position, or can be used for control of those items.
Despite the difficulty of gaining process and control system understanding, the 2014
German Steel Mill Cyber Attack illustrated that adversaries learned sufficient details
about the environment, leveraged specialized ICS knowledge, and caused multiple
control system failures that ultimately led to a plant outage and consequential physical
equipment damage (Lee, Assante, & Conway, 2014). The 2015 Ukraine power grid
attack is a further example of adversaries learning the environment and leveraging trusted
communications to cause an electrical grid outage. The second attack on the Ukraine
power grid, which happened in 2016, utilized extensible ICS specific malware that is
known as CRASHOVERRIDE. The malware contained an IEC104 protocol module,
@ 2021 SANS Institute Author Retains Full Rights

Recommended for you

169
169169
169

Whenyour computer isconnected to the Internet, you expose your computer to a variety of potentialthreats. The Internet isdesigned in such a waythat if you have access to the Internet, all other computers on the Internet canconnect to yourcomputer.Thisleavesyouvulnerable to variouscommonattacks. This isespeciallytroubling as severalpopular programs open services on your computer thatallowothers to view files on your computer! Whilethisfunctionalityisexpected, the difficultyisthatsecurityerrors are detectedthatalwaysallow hackers to attackyour computer with the ability to view or destroy sensitive information stored on your computer. To protectyour computer fromsuchattacksyouneed to "teach" your computer to ignore or resistexternaltestingattempts. The commonname for such a program is Firewall. A firewall is software thatcreates a secureenvironmentwhosefunctionis to block or restrictincoming and outgoing information over a network. These firewalls actually do not work and are not suitable for business premises to maintain information securitywhilesupporting free exchange of ideas. Firewall are becoming more and more sophisticated in the day, and new features are beingadded all the time, sothat, despitecriticism and intimidatingdevelopmentmethods, they are still a powerfuldefense. In thispaper, weread a network firewall thathelps the corporateenvironment and other networks thatwant to exchange information over the network. The firewall protects the flow of trafficthrough the internet and limits the amount of external and internal information and provides the internal user with the illusion of anonymous FTP and www online communications.

firewall technologiesnetwork securityaccess control
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkA Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless Network

This document discusses a modular approach to intrusion detection in homogeneous wireless networks. It begins by introducing wireless networks and the need for intrusion detection systems (IDS) due to security vulnerabilities. It then discusses different types of IDS, including signature-based detection that identifies known attacks, and anomaly-based detection that identifies deviations from normal behavior but can result in high false positives. The document proposes a modular approach combining advantages of signature-based and anomaly-based detection for high detection rates and low false positives. Requirements for IDS in wireless networks are also outlined.

sidattackswns
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...

This UL white paper discusses some of the many issues and challenges that must be addressed in the future deployment of wireless technology for the processing of secure transactions. It begins with a discussion of the strengths and limitations of both contactless and wireless technologies. The white paper then reviews and assesses internal system risks, as well as external security concerns, for both technologies. The paper concludes with some thoughts on the future use of wireless technology in secure transactions, and how manufacturers can provide assurances to both system providers and users regarding the security of their private data.

transactionsulwireless data
©
2
0
2
0
T
h
e
S
A
N
S
I
n
s
t
i
t
u
t
e
,
A
u
t
h
o
r
R
e
t
a
i
n
s
F
u
l
l
R
i
g
h
t
s
© 2020 The SANS Institute Author retainsfull rights.
Mitigating Vulnerable ICS Protocols 4
	
Michael	Hoffman,	mjhoffman80@gmail.com	
	 	
among others, that leveraged capabilities to pull RTU configurations in the ICS
environment. The IEC104 module then used this implementation-specific knowledge to
manipulate breaker positions, leading to a power outage (Lee R. M., 2017). As Slowik
suggests, ICS attacks appear to be increasing both in relative frequency and severity
(2019). Therefore, when considering the increasing threat to the ICS environment, it
becomes imperative for asset owners and operators to leverage proper device
configuration, programming methodologies, and network security barriers to increase the
security posture of ICS devices that use insecure protocol communication.
1.3. ICS Security Challenges and Potential Solutions
The Stuxnet malware that infected Siemens PLCs to perform centrifuge cascade
overpressure and centrifuge rotor speed operational manipulations at the Natanz Fuel
Enrichment Plants marked a decisive change in the history of the ICS community
(Langer, 2013). Since Stuxnet, ICS owners, operators, and vendors have begun to take
notice of their vulnerable systems and incorporate increased security controls. As an
example, Rockwell Automation ControlLogix PLCs now can encrypt their programs and
lock access to routines (Allen-Bradley, 2018). Additionally, they have included new CIP
security enhancements in their communication modules to encrypt EtherNet/IP protocol
traffic between PLCs and drives (Rockwell Automation, 2019). For their S7 PLC product
line, Siemens has implemented password block protection and three staggered CPU
protection levels (Siemens, 2016).
Despite these improvements, researchers are still at work uncovering many
vulnerabilities in ICS devices. For the year of 2018, Dragos indicated that 17 ICS
vulnerability advisories are reported monthly, on average, and of those advisories, 28
percent are related to PLCs and industrial equipment (Dragos, 2018). For the asset
owners and operators, however, PLCs and industrial equipment are the same devices used
in control systems of physical processes and cannot be easily patched without causing a
process disruption. For specific industries and processes, an average span of five to six
years is prevalent between maintenance windows where firmware can be upgraded.
These devices also are at a functional location in the Purdue Model where the
responsibility of work blurs between various staff, including instrumentation technicians,
@ 2021 SANS Institute Author Retains Full Rights
©
2
0
2
0
T
h
e
S
A
N
S
I
n
s
t
i
t
u
t
e
,
A
u
t
h
o
r
R
e
t
a
i
n
s
F
u
l
l
R
i
g
h
t
s
© 2020 The SANS Institute Author retainsfull rights.
Mitigating Vulnerable ICS Protocols 5
	
Michael	Hoffman,	mjhoffman80@gmail.com	
	 	
electricians, automation engineers, ICS security engineers, and vendors. Therefore,
coordination with operations personnel and working closely with technical staff is
necessary to perform device-level firmware upgrades. Nevertheless, apart from keeping
devices patched, many of these devices are still insecure by design and can be
manipulated by an attacker without leveraging any unpatched vulnerability (Langner,
2019).
Still, a variety of potential controls and protective measures do exist for these
“insecure-by-design” systems. Many vendors offer embedded PLC and RTU security
configuration settings. Other potential defenses include properly checking range values in
the PLC code itself, which is not unlike conventional standard programming best
practices (McConnell, 2004). Additional essential controls include establishing startup or
“default” values in the PLC for proper recovery (Shearer, Dely, Conway, & Robinson,
2019). Finally, installing an Application layer ICS firewall to permit only those PLC
functions necessary for the intended program, is yet another mitigating control
(Bodungen, Singer, Shbeeb, Hilt, & Wilhoit, 2017). Therefore, a holistic effort is needed
for ICS device-level security, as shown in Figure 3, starting with applying the latest
tested firmware, disabling services unneeded, and enabling security controls already
supplied by the vendor.
ICS DMZ
Perimeter
Zone and
Device
Perimeter
Program
and Device
Security
Device
Firmware
@ 2021 SANS Institute Author Retains Full Rights
©
2
0
2
0
T
h
e
S
A
N
S
I
n
s
t
i
t
u
t
e
,
A
u
t
h
o
r
R
e
t
a
i
n
s
F
u
l
l
R
i
g
h
t
s
© 2020 The SANS Institute Author retainsfull rights.
Mitigating Vulnerable ICS Protocols 6
	
Michael	Hoffman,	mjhoffman80@gmail.com	
	 	
Figure 3. Layers ICS device protection
The next layer of security is achieved by implementing secure programming practices,
such as treating any external data as suspect and ensuring that if devices do fail or are
compromised, they can be restarted with necessary default values for safe operation. The
final layers of Device, Zone, and Parameter protection provide facilities to tightly restrict
communication at ICS protocol level and protect the lower functional networks from
those levels above them.
This research will demonstrate that it is possible to increase the level of effort
required for an attacker to maliciously abuse ICS devices that use insecure protocols
through the implementation of configuration, programming, and network security
controls. With these potential mitigation solutions reviewed, the remaining sections cover
assessments leveraging both the SANS ICS515 and ICS612 course student kits.
2. Research Method
The criteria for researching the proposed mitigations was to leverage ICS devices
provided to SANS ICS course students, ensure assessments could be repeated by other
researchers, and provide techniques that could be tailored and extended to various ICS
systems. As shown in figure 2, the components in the ICS VLAN include student PLC
kits from SANS ICS515 and ICS612 courses and a MOXA EDR-G903 Modbus
Application layer firewall. For the supervisory VLAN, a workstation VM was used for
both PLC and CybatiWorks development. Additionally, the ctmodbus tool was utilized
from the ControlThingsIO Platform VM to generate Modbus packets in an attempt to
overwrite coils and registers in the ICS VLAN (ControlThings I/O, 2020). A separate
VM was deployed to run Wireshark to monitor traffic from either the ICS VLAN or
between the CLICK PLC and Modbus firewall. A Cisco IE-3010 switch was used to
route cross-VLAN communication and was configured to mirror all ICS VLAN traffic
coming through the switch out to the Wireshark VM.
@ 2021 SANS Institute Author Retains Full Rights
©
2
0
2
0
T
h
e
S
A
N
S
I
n
s
t
i
t
u
t
e
,
A
u
t
h
o
r
R
e
t
a
i
n
s
F
u
l
l
R
i
g
h
t
s
© 2020 The SANS Institute Author retainsfull rights.
Mitigating Vulnerable ICS Protocols 7
	
Michael	Hoffman,	mjhoffman80@gmail.com	
	 	
Figure 2. ICS Lab Setup
The ICS515 package incorporated a modified version of a traffic light program, used in
the course, to simulate a four-way stoplight. The ICS612 CLICK PLC programming was
modified to read and write Modbus registers from the ICS515 CybatiWorks Raspberry
PI. The updated CLICK PLC program displayed the traffic lights status, the Raspberry
system time on the local HMI, and had the capability to control the traffic lights and
update the Raspberry system time from the HMI. This configuration is like many PLC-to-
PLC communications used in various ICS environments. In this instance, the
CybaitWorks Raspberry PI is functioning as a Modbus Slave, and the CLICK PLC is
functioning as a Modbus Master with full read/write capability.
The first assessment consisted of configuring internal security controls in the CLICK
PLC processor for communication session handling to determine if it would be effective
against the remote attackers Modbus tool. Although this does test the effectiveness of the
@ 2021 SANS Institute Author Retains Full Rights

Recommended for you

Ijnsa050214
Ijnsa050214Ijnsa050214
Ijnsa050214

Improved Ids using Layered CRFS with Logon Restrictions and Mobile Alerts Based on Deviant System Behaviour

network security
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...

After tightening up network perimeter for dealing with external threats, organizations have woken up to the threats from inside Local Area Networks (LAN) over the past several years. It is thus important to design and implement LAN security strategies in order to secure assets on LAN by filtering traffic and thereby protecting them from malicious access and insider attacks. Banking Financial Services and Insurance (BFSI) industry is one such segment that faces increased risks and security challenges. The typical architecture of this segment includes several thousands of users connecting from various branches over Wide Area Network (WAN) links crossing national and international boundaries with varying network speed to access data center resources. The objective of this work is to deploy LAN security solution to protect the data center located at headquarters from the end user machines. A LAN security solution should ideally provide Network Access Control (NAC) along with cleaning (securing) the traffic going through it. Traffic cleaning itself includes various features like firewall, intrusion detection/prevention, traffic anomaly detection, validation of asset ownership etc. LANenforcer (LE) is a device deployed in front of the data center such that the traffic from end-user machines necessarily passes through it so that it can enforce security. The goal of this system is to enhance the security features of a LANenforcer security system with Intrusion Prevention System (IPS) to enable it to detect and prevent malicious network activities. IPS is plugged into the packet path based on the configuration in such a way that the entire traffic passes through the IPS on LE.

lan securitylanenforcerips
Mobile slide
Mobile slideMobile slide
Mobile slide

This document provides an analysis of security issues and solutions for routing protocols in wireless sensor networks and wireless mesh networks. It discusses various threats and attacks at different layers of the OSI model, including jamming, man-in-the-middle attacks, and denial-of-service attacks at the physical layer. At higher layers, threats include selective forwarding, sinkhole attacks, and wormhole attacks. The document then outlines some solutions, such as intrusion prevention, intrusion detection systems, and key management techniques. It concludes by discussing prospects for improved security through techniques like elliptic curve cryptography and quantum cryptography.

©
2
0
2
0
T
h
e
S
A
N
S
I
n
s
t
i
t
u
t
e
,
A
u
t
h
o
r
R
e
t
a
i
n
s
F
u
l
l
R
i
g
h
t
s
© 2020 The SANS Institute Author retainsfull rights.
Mitigating Vulnerable ICS Protocols 8
	
Michael	Hoffman,	mjhoffman80@gmail.com	
	 	
CLICK PLC security controls, the researcher acknowledges that it likely has limited
portability to other PLCs manufactures, such as Rockwell and Siemens, which include
different security measures in their products. The second assessment included adding
ladder logic code to separate running logic from communication logic. This step
encompasses adding input filtering, which is essentially adopting and porting standard
computer programing best practices to PLC ladder logic programming (OWASP Top
Ten, 2020). Part of this process/step included adding default startup values to the code to
bring the PLC back to a safe operational state in the event of a successful attack. The
final test added a MOXA secure router in front of the CLICK PLC with a custom
configuration to allow only the required Modbus register types and ranges between the
two devices.
3. Findings and Discussion
Throughout the testing, it was evident that the devices under consideration are
designed to operate with known “good” parameters, settings, and communications.
During the firewall assessment, the CLICK PLC Modbus master and slave ladder logic
blocks froze due to dropped Modbus connectivity and had to be restarted. Likewise,
during the same assessment, the REXYGEN Modbus server component in the Raspberry
PI froze from multiple dropped sockets and required a service restart to get
communications working. Additionally, the CybatiWorks unit experienced an SD card
corruption early in the testing. In order to get the Raspberry PI operational, the system
was rebuilt using a new Raspbian Linux image and the latest version of the REXYGEN
Core package. These issues highlight the importance of assessing ICS systems in a safe
lab environment where device failures have a limited impact on the physical
environment.
The following assessments carried out on the CLICK PLC, programs, CybatiWorks
Raspberry PI, and Moxa firewall, take the approach of applying security controls from
the inside out. This method consists of starting with device security, then focusing on
programming controls, and finally, providing a secure network perimeter. The
@ 2021 SANS Institute Author Retains Full Rights
©
2
0
2
0
T
h
e
S
A
N
S
I
n
s
t
i
t
u
t
e
,
A
u
t
h
o
r
R
e
t
a
i
n
s
F
u
l
l
R
i
g
h
t
s
© 2020 The SANS Institute Author retainsfull rights.
Mitigating Vulnerable ICS Protocols 9
	
Michael	Hoffman,	mjhoffman80@gmail.com	
	 	
assessments began with updating device firmware to the latest version to ensure the most
recent vendor security settings and controls were available for testing.
3.1. PLC Security Controls Assessment
The CLICK programming software and PLC firmware version, which are often
aligned, was at version 2.40. At the time of assessment, version 2.51 was available and
subsequently installed. An upgrade to the PLC firmware followed with a project file
upgrade. Upon initial review, the default configuration of the PLC was unprotected and
allowed the PLC to be entirely manipulated by anyone with local or remote network
access. Program uploads and downloads, operational changes, and data could be all
manipulated.
After reviewing the security settings, password protection features were enabled
for the project file and system configuration. Enabling these settings protects both the
PLC program (ladder logic) and CPU (IP address, client/server settings, etc.) from being
read or manipulated without a password. As shown in Figure 4, password protection
settings for data reads and writes were also enabled to lock down remote Modbus
interactions to the PLC acting as a Modbus slave. EtherNet/IP was out of scope for the
assessment and disabled in a configuration section, not shown.
Figure 4. PLC password security settings
With password security enabled, the program was downloaded to the PLC. Initial testing
revealed that Modbus read and write functionality could still be performed using the
ctmodbus tool. Troubleshooting revealed that for the settings to take effect, the PLC
@ 2021 SANS Institute Author Retains Full Rights
©
2
0
2
0
T
h
e
S
A
N
S
I
n
s
t
i
t
u
t
e
,
A
u
t
h
o
r
R
e
t
a
i
n
s
F
u
l
l
R
i
g
h
t
s
© 2020 The SANS Institute Author retainsfull rights.
Mitigating Vulnerable ICS Protocols 10
	
Michael	Hoffman,	mjhoffman80@gmail.com	
	 	
needed to be rebooted. After rebooting the PLC, any remote Modbus TCP read requests
failed, with the slave device failure error, as shown in Figure 5. It is important to note,
however, that if an attacker had access to the same VLAN where ICS is connected, they
could perform a layer two attack and capture the password during the initial
authentication challenge.
Figure 5. Wireshark capture of a Modbus read failure
The password security control for data is a global setting --affecting not only Ethernet
communication but also serial communication, which is an essential consideration for
enabling such a security control. The local HMI, which is part of the ICS612 student kit,
is connected to the second port on the CLICK PLC, which is an RS-232C serial port and
uses Modbus to read and write values. With the data security setting enabled, the HMI
displayed a data access error as it could not read PLC values. Testing further commenced
for Modbus writes, and those also failed, as shown in Figure 6.
Figure 6. Wireshark capture of a Modbus write failure
@ 2021 SANS Institute Author Retains Full Rights
©
2
0
2
0
T
h
e
S
A
N
S
I
n
s
t
i
t
u
t
e
,
A
u
t
h
o
r
R
e
t
a
i
n
s
F
u
l
l
R
i
g
h
t
s
© 2020 The SANS Institute Author retainsfull rights.
Mitigating Vulnerable ICS Protocols 11
	
Michael	Hoffman,	mjhoffman80@gmail.com	
	 	
Based on the results above, the device controls effectively worked by limiting Modbus
connectivity to an external Modbus master device irrespective of the transport protocol.
However, despite Modbus slave isolation, the PLC continued to work correctly as a
Modbus master by reading values from the ICS515 CybatiWorks modified traffic light
program.
After verifying modus slave data password enforcement for reading and writing,
the security settings were reverted. As shown in Figure 7, by enabling Modbus reads in
the PLC security settings, the ctmodbus tool was able to read the PLC values once again.
Figure 7. ctmodbus tool illustrating Modbus reads
Figure 8 shows the traffic generated by the ctmodbus tool, which is precisely the same,
and further reinforces that Modbus values are transmitted in the clear and can easily be
deciphered.
@ 2021 SANS Institute Author Retains Full Rights

Recommended for you

Evaluation of enhanced security solutions in
Evaluation of enhanced security solutions inEvaluation of enhanced security solutions in
Evaluation of enhanced security solutions in

Traditionally, 802.11-based networks that relied on wired equivalent protocol (WEP) were especially vulnerable to packet sniffing. Today, wireless networks are more prolific, and the monitoring devices used to find them are mobile and easy to access. Securing wireless networks can be difficult because these networks consist of radio transmitters and receivers, and anybody can listen, capture data and attempt to compromise it. In recent years, a range of technologies and mechanisms have helped makes networking more secure. This paper holistically evaluated various enhanced protocols proposed to solve WEP related authentication, confidentiality and integrity problems. It discovered that strength of each solution depends on how well the encryption, authentication and integrity techniques work. The work suggested using a Defence-in-Depth Strategy and integration of biometric solution in 802.11i. Comprehensive in-depth comparative analysis of each of the security mechanisms is driven by review of related work in WLAN security solutions.

tkipsslvpn
D03302030036
D03302030036D03302030036
D03302030036

The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.

Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...
Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...
Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...

This document presents a proposed system for detecting victim systems in client networks using a coarse-grained botnet algorithm. The system uses a two-stage approach: 1) the primary stage detects and collects network anomalies related to botnets; 2) the second stage identifies bots and blocks them from entering the receiver end, identifying bot sender IP addresses. The system implements a scanner to identify bot files, scanning incoming files in both the sender and receiver ends if protection mode is enabled. This avoids intrusions and blocks unauthorized users from accessing the application. The proposed system can help avoid botnet infections spreading in client networks.

irjet
©
2
0
2
0
T
h
e
S
A
N
S
I
n
s
t
i
t
u
t
e
,
A
u
t
h
o
r
R
e
t
a
i
n
s
F
u
l
l
R
i
g
h
t
s
© 2020 The SANS Institute Author retainsfull rights.
Mitigating Vulnerable ICS Protocols 12
	
Michael	Hoffman,	mjhoffman80@gmail.com	
	 	
Figure 8. Modus reads captured by Wireshark
Beyond password security controls tested, the CLICK PLC did not offer restricted
access on PLC tags themselves, although it did indicate tag access, as shown in Figure 9.
Figure 9. CLICK PLC tags showing Read/Write (RW) attributes
In contrast, Rockwell PLCs do offer external access attributes to control how external
applications interact with the tag, which provides yet another means to restrict external
communication at the tag value level (Allen-Bradley, 2018, p. 64). External access
settings can be Read/Write, Read-Only, and None, which means that external
applications, such as HMI, PLCs, or Historians, would not be able to interact with the tag.
@ 2021 SANS Institute Author Retains Full Rights
©
2
0
2
0
T
h
e
S
A
N
S
I
n
s
t
i
t
u
t
e
,
A
u
t
h
o
r
R
e
t
a
i
n
s
F
u
l
l
R
i
g
h
t
s
© 2020 The SANS Institute Author retainsfull rights.
Mitigating Vulnerable ICS Protocols 13
	
Michael	Hoffman,	mjhoffman80@gmail.com	
	 	
Similarly, the CybatiWorks REXYGEN application running on the Raspberry PI did have
the ability to restrict Modbus access at the tag level, as shown in Figure 10.
Figure 10. REXYGEN Modbus Slave configuration with read/write restriction
The auto_mode tag controls the traffic light program; toggling the bit will cause
the traffic lights to stop or start the cyclic program operation. With the value set to both
readable and writable, the ctmodbus tool was able to read the register at the time 16:51:23
with a value of one and then wrote over the register with a zero and subsequently re-read
the register with a value of zero at 16:51:49, as shown below in Figure11.
Figure 11. ctmodbus tool modifying auto_mode tag on the Raspberry PI
By making a configuration change to the auto_mode tag to select only writeable (this is
per documentation for a REXYGEN Modbus slave settings and not a typo), the
auto_mode value was able to be read but not written. As shown in Figure 12, the Write
@ 2021 SANS Institute Author Retains Full Rights
©
2
0
2
0
T
h
e
S
A
N
S
I
n
s
t
i
t
u
t
e
,
A
u
t
h
o
r
R
e
t
a
i
n
s
F
u
l
l
R
i
g
h
t
s
© 2020 The SANS Institute Author retainsfull rights.
Mitigating Vulnerable ICS Protocols 14
	
Michael	Hoffman,	mjhoffman80@gmail.com	
	 	
Single Register 2 with a value of 1 did not affect the register value, and the subsequent
Read Holding register still showed a value of zero.
Figure 12. ctmodbus unable to modify auto_mode tag on the Raspberry PI
Therefore, this assessment indicates that the REXYGEN Modbus server can
restrict access at the granular tag level. Restricting read and write access to Modbus
registers and coils not required for the control implementation reduces the attack surface
to the device. Furthermore, it is crucial to restrict access to functionality not required and
apply standard security practices such as those given in CIS Control 5 (Center for Internet
Security, 2020). If a PLC offers services such as a web portal, FTP host, or SSH host,
these services and protocols should be thoroughly scrutinized and disabled if possible, to
decrease the attack surface for the respective PLC controller and given control scenario.
Once these device-level mitigations are employed, the next step to holistically secure
these devices is to evaluate potential PLC program vulnerabilities and review their
mitigations.
3.2. PLC Programming Assessment
Beyond leveraging security controls that vendors have built into their products, the
actual implementation of programs and logic running in PLC devices affect the overall
security of their implementation. Despite running legacy protocols with no built-in
security, asset owners and operators can leverage programming best practices that have
been common in the IT community inside their PLC and RTU programs. Some of these
areas include properly defined interfaces between logic and functional blocks. Others
@ 2021 SANS Institute Author Retains Full Rights
©
2
0
2
0
T
h
e
S
A
N
S
I
n
s
t
i
t
u
t
e
,
A
u
t
h
o
r
R
e
t
a
i
n
s
F
u
l
l
R
i
g
h
t
s
© 2020 The SANS Institute Author retainsfull rights.
Mitigating Vulnerable ICS Protocols 15
	
Michael	Hoffman,	mjhoffman80@gmail.com	
	 	
include data type and range validation. Although these techniques are not a one-to-one
mapping between conventional programming and PLC ladder logic/function blocks,
many of the constructs do carry over.
One specific security construct in computer programming that carries over to PLC
programming is the notion of limiting the scope, or access, to variables. In referring to
minimizing scope, McConnell states, “…you should declare each variable to be visible to
the smallest segment of code that it needs to see it” (Code Complete, 2004, p. 251).
Vendors, such as Rockwell, have implemented this security practice by providing the
option to configure Tag variable scope. For Rockwell PLCs specifically, tag scope can be
set to Controller Level or Program Level, which determines if the tag value can be read
and written from within a set of programs running on a PLC. Program scope tags, which
have local scope, cannot be used for external communication directly, such as with
EtherNet/IP or Modbus TCP, and depend on Controller Scope tags to interact outside of
their program (Allen-Bradley, 2018, p. 25). Upon review of the CLICK PLC, tag scope
could not be restricted or segmented to various programs, and therefore this feature was
not tested as all memory locations are globally accessible.
Validating inputs is a critical component in secure computer programming. With
regards to PLC ladder logic, function blocks, or structured text, this concept is no
different. According to OWASP, “Input validation should happen as early as possible in
the data flow, preferably as soon as the data is received from the external party”
(OWASP, 2020). For external connectivity, this translates to validating external data
from a Modbus TCP connection. As shown in Figure 13, the addresses of DS131 and
DS132 are populated directly by external data from the CybatiWorks kit.
@ 2021 SANS Institute Author Retains Full Rights

Recommended for you

RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...

Network defense implies a comprehensive set of software tools to preclude malicious entities from conducting activities such as exfiltration of data, theft of credentials, blocking of services and other nefarious activities. For most enterprises at this time, that defense builds upon a clear concept of the fortress approach. Many of the requirements are based on inspection and reporting prior to delivery of the communication to the intended target. These inspections require decryption of packets and this implies that the defensive suite either impersonates the requestor, or has access to the private cryptographic keysof the servers that are the target of communication. This is in contrast to an end-to-end paradigm where known good entities can communicate directly and no other entity has access to the content unless that content is provided to them. There are many new processes that require end-to-end encrypted communication, including distributed computing, endpoint architectures, and zero trust architectures and enterprise level security. In an end-to-end paradigm, the keys used for authentication, confidentiality, and integrity reside only with the endpoints. This paper examines a formulation that allows unbroken communication, while meeting the inspection and reporting requirements of a network defense. This work is part of a broader security architecture termed Enterprise Level Security (ELS)framework.

applianceend-to-end security modelels
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...

Network defense implies a comprehensive set of software tools to preclude malicious entities from conducting activities such as exfiltration of data, theft of credentials, blocking of services and other nefarious activities. For most enterprises at this time, that defense builds upon a clear concept of the fortress approach. Many of the requirements are based on inspection and reporting prior to delivery of the communication to the intended target. These inspections require decryption of packets and this implies that the defensive suite either impersonates the requestor, or has access to the private cryptographic keysof the servers that are the target of communication. This is in contrast to an end-to-end paradigm where known good entities can communicate directly and no other entity has access to the content unless that content is provided to them. There are many new processes that require end-to-end encrypted communication, including distributed computing, endpoint architectures, and zero trust architectures and enterprise level security. In an end-to-end paradigm, the keys used for authentication, confidentiality, and integrity reside only with the endpoints. This paper examines a formulation that allows unbroken communication, while meeting the inspection and reporting requirements of a network defense. This work is part of a broader security architecture termed Enterprise Level Security (ELS)framework.

applianceend-to-end security modelels
Efficient String Matching Algorithm for Intrusion Detection
Efficient String Matching Algorithm for Intrusion DetectionEfficient String Matching Algorithm for Intrusion Detection
Efficient String Matching Algorithm for Intrusion Detection

Intrusion Detection Systems (IDSs) have become widely recognized as powerful tools for identifying, deterring and deflecting malicious attacks over the network. Intrusion detection systems (IDSs) are designed and installed to aid in deterring or mitigating the damage that can be caused by hacking, or breaking into sensitive IT systems. . The attacks can come from outsider attackers on the Internet, authorized insiders who misuse the privileges that have been given them and unauthorized insiders who attempt to gain unauthorized privileges. IDSs cannot be used in isolation, but must be part of a larger framework of IT security measures. Essential to almost every intrusion detection system is the ability to search through packets and identify content that matches known attacks. Space and time efficient string matching algorithms are therefore important for identifying these packets at line rate. In this paper we examine string matching algorithm and their use for Intrusion Detection. Keywords: System Design, Network Algorithm

knowledgecuddlecomputer engineeringinformation technology
©
2
0
2
0
T
h
e
S
A
N
S
I
n
s
t
i
t
u
t
e
,
A
u
t
h
o
r
R
e
t
a
i
n
s
F
u
l
l
R
i
g
h
t
s
© 2020 The SANS Institute Author retainsfull rights.
Mitigating Vulnerable ICS Protocols 16
	
Michael	Hoffman,	mjhoffman80@gmail.com	
	 	
Figure 13. PLC logic with no input testing
Because the tags can be written from an external source, the data value of DS131, which
is always being overwritten by the Modbus read block, can also be overwritten by an
attacker. In this example, a latching “SET” is used to capture the event due to how fast
the values are being overwritten from the CybatiWorks data. By leveraging the ctmodbus
tool again, the Modbus address of 130 (displayed as 131 in Figure 13) is manipulated by
forcing a value from the remote laptop, as shown in Figure 14.
Figure 14. ctmodbus tool used to manipulate a register holding year data
The Modbus register mapped for the SET instruction at address C90 is 16474, but the
actual register area in memory is at 16473, which is most likely due to a one-off
implementation difference with the address labels starting at one versus the actual
memory addresses starting at 0. After hexadecimal value of 00c8 (200 in decimal) is
written to 130 (DS131 in Figure 13), the compare logic sees a difference in values and
sets the internal C90 bit to True, which is reflected in the second Read Discrete Inputs
@ 2021 SANS Institute Author Retains Full Rights
©
2
0
2
0
T
h
e
S
A
N
S
I
n
s
t
i
t
u
t
e
,
A
u
t
h
o
r
R
e
t
a
i
n
s
F
u
l
l
R
i
g
h
t
s
© 2020 The SANS Institute Author retainsfull rights.
Mitigating Vulnerable ICS Protocols 17
	
Michael	Hoffman,	mjhoffman80@gmail.com	
	 	
request return value of 1, and is further illustrated in Figure 15 with SET output
highlighted in blue.
Figure 15. PLC program manipulation due to an external overwrite
A possible mitigation for this attack is to provide input range checking for the values. If a
malicious individual or program exploits a vulnerable protocol, the values passed by the
input validation will at least be in the range that the PLC program is designed to handle.
As shown in Figure 16, the CybatiWorks hour value is read into register DS134 and
verified to ensure the value is greater than or equal to 0 and less than or equal to 24. If the
value falls between these ranges, it is copied over to a separate register (DS87 in this
case) for use in the PLC logic. 	
Figure 16. PLC inputs with range checking
As shown in Figure 17, the range validation assessment is carried out by first reading the
value of DS87, which is input register 86. Upon the first read request, the register
provides a value of Hex of 13, or Decimal 19.
@ 2021 SANS Institute Author Retains Full Rights
©
2
0
2
0
T
h
e
S
A
N
S
I
n
s
t
i
t
u
t
e
,
A
u
t
h
o
r
R
e
t
a
i
n
s
F
u
l
l
R
i
g
h
t
s
© 2020 The SANS Institute Author retainsfull rights.
Mitigating Vulnerable ICS Protocols 18
	
Michael	Hoffman,	mjhoffman80@gmail.com	
	 	
Figure 17. Testing input validation against external overwrite
Register 133, which is DS134, is then overwritten by a value of Decimal 25, or Hex 19,
and then DS87 is re-read to verify that the value is not changed, thus proving that the
input validation logic is working. Despite still having the ability to overwrite a value
within the input range validation area remotely, the program logic will be able to handle
an input over-range or under-range condition, thereby avoiding a logic error or PLC
Processor fault.
Another essential reason to separate inputs from logic is to provide a snapshot of
the values for orderly program flow and execution. PLCs have historically operated in a
synchronous, cyclic fashion where inputs are read, logic solved, and outputs are written.
Nevertheless, many newer PLCs can communicate asynchronously between input,
communication, and output modules during program execution. This topic is referred to
as buffering I/O data, and as Scott describes, “…input and output values can change in
the middle of a program scan and [can] put the program in an unpredictable state (2015,
p. 77).” Therefore, it is crucial to take a snapshot of all values used for program logic to
ensure they remain unchanged, and then validate inputs before using them in PLC logic,
as Figure 18 illustrates.
@ 2021 SANS Institute Author Retains Full Rights
©
2
0
2
0
T
h
e
S
A
N
S
I
n
s
t
i
t
u
t
e
,
A
u
t
h
o
r
R
e
t
a
i
n
s
F
u
l
l
R
i
g
h
t
s
© 2020 The SANS Institute Author retainsfull rights.
Mitigating Vulnerable ICS Protocols 19
	
Michael	Hoffman,	mjhoffman80@gmail.com	
	 	
	
Figure 18. Example PLC Cycle with added buffering and validation
Despite the effort to buffer input data and validate range, an attacker could still
overwrite values using insecure ICS protocols within the acceptable analog value range
or with coils where range validation would still accept a 0 or 1. If an ICS cyber event
were to occur, it could cause a PLC logic error, CPU fault, or, worse yet, affect the
physical process under control. Therefore, a recovery function is necessary to restore
operations after a cybersecurity event (NIST, 2018). As discussed by Shearer, Dely,
Conway, and Robinson, the specific recovery, in this case, is to provide an initialization
routine that injects safe startup values for the respective logic and process (2019). One
method to carry out this feature is to leverage a first scan bit, which is energized only
upon the first PLC scan cycle, as shown in Figure 19.
Figure 19. PLC First Scan Bit used to call the INITIALIZE subroutine
Depending on the PLC manufacture, the first scan bit can be set using the programming
software or a local mode switch on the PLC processor. The CLICK PLC provides a
RUN/STOP switch to change PLC modes. However, cycling power to the processor will
Read
Inputs
Buffer
I/O
Input
Validation
Execute
Logic
Write
Outputs
Comms,
Status
@ 2021 SANS Institute Author Retains Full Rights

Recommended for you

hashdays 2011: Felix 'FX' Lindner - Targeted Industrial Control System Attack...
hashdays 2011: Felix 'FX' Lindner - Targeted Industrial Control System Attack...hashdays 2011: Felix 'FX' Lindner - Targeted Industrial Control System Attack...
hashdays 2011: Felix 'FX' Lindner - Targeted Industrial Control System Attack...

The talk will show you the techical details of Stuxnet in their full glory and make you appreciate this work of engineering more. Based on a code-level analysis of the Stuxnet PLC payload, the presentation will explain techniques therein that can be used for industrial espionage and sabotage by copycat attackers against competitor's production facilities. Currently recommended defenses, their shortcomings and alternative approaches will also be discussed. Bio: Felix 'FX' Lindner is founder and technical lead of the Recurity Labs GmbH consulting and research team. He is also the leader of the Phenoelit group and loves to hack pretty much everything with a CPU and some communication, preferably networked. He looks back at 15+ years of (legal) hacking with only a couple Cisco IOS and SAP remote exploits, tools for hacking HP printers and protocol attacks lining the road.

securityhackingstuxnet
Wrapped rsa cryptography check on window
Wrapped rsa cryptography check on windowWrapped rsa cryptography check on window
Wrapped rsa cryptography check on window

This document summarizes an article from the International Journal of Computer Engineering and Technology. The article proposes using an FPGA-based hardware dongle to securely implement RSA cryptography and prevent secret software information from being extracted. It describes using the FPGA to perform half of the RSA encryption process, with the other half decrypted on the software side. The document provides details on the RSA encryption algorithm, FPGA programming, a design for interfacing between a computer and the FPGA dongle, and results of encrypting data with the proposed system. It concludes the approach provides a way to wrap the RSA layer and restrict applications from running without a connected dongle.

A Collaborative Intrusion Detection System for Cloud Computing
A Collaborative Intrusion Detection System for Cloud ComputingA Collaborative Intrusion Detection System for Cloud Computing
A Collaborative Intrusion Detection System for Cloud Computing

Cloud computing is a computing paradigm that shifts drastically from traditional computing architecture. Although this new computing paradigm brings many advantages like utility computing model but the design in not flawless and hence suffers from not only many known computer vulnerabilities but also introduces unique information confidentiality, integrity and availability risks as well due its inherent design paradigm. To provide secure and reliable services in cloud computing environment is an important issue. To counter a variety of attacks, especially large-scale coordinated attacks, a framework of Collaborative Intrusion Detection System (IDS) is proposed. The proposed system could reduce the impact of these kinds of attacks through providing timely notifications about new intrusions to Cloud users' systems. To provide such ability, IDSs in the cloud computing regions both correlate alerts from multiple elementary detectors and exchange knowledge of interconnected Clouds with each other.

cloud computingcollaborative idscollaborative ids for cloud
©
2
0
2
0
T
h
e
S
A
N
S
I
n
s
t
i
t
u
t
e
,
A
u
t
h
o
r
R
e
t
a
i
n
s
F
u
l
l
R
i
g
h
t
s
© 2020 The SANS Institute Author retainsfull rights.
Mitigating Vulnerable ICS Protocols 20
	
Michael	Hoffman,	mjhoffman80@gmail.com	
	 	
always cause the first scan bit to transition from false to true (0 to 1, respectively) for one
cycle. Because the Main Program is continuously executed, utilizing a first scan bit to
trigger the initialization subroutine is an effective way to compartmentalize code and
ensure the subroutine is only executed once. As shown in Figure 20, the initialization
subroutine both resets and sets latching outputs.
Figure 20. INITIALIZE subroutine example
In PLCs, a latching output is held in a true or false condition for an indefinite period until
a logical condition causes a state change. In this example, the initialization subroutine is
also leveraged to move constant integer values into memory locations for range checking
or other critical program functions. These pre-engineered values injected from the
initialization program ensures safe process startup conditions.
Although the discussed programming practices are necessary for secure program
design and implementation, they do nothing to protect the ICS device perimeter from
malicious abuse of ICS protocols or specially crafted packets. Therefore, an ICS-specific
Application layer firewall is the next logical mitigation step to protect ICS devices using
vulnerable communication protocols.
3.3. ICS Application Layer Firewall Assessment
Firewalls are border protection devices and control communication between
different levels of trust (CISA, 2020). In the ICS space, firewalls are commonly used to
define the boundary between the corporate network and ICS network, create the ICS
DMZ, and further segregate levels of trust deeper in the control network (NIST, 2015, pp.
@ 2021 SANS Institute Author Retains Full Rights
©
2
0
2
0
T
h
e
S
A
N
S
I
n
s
t
i
t
u
t
e
,
A
u
t
h
o
r
R
e
t
a
i
n
s
F
u
l
l
R
i
g
h
t
s
© 2020 The SANS Institute Author retainsfull rights.
Mitigating Vulnerable ICS Protocols 21
	
Michael	Hoffman,	mjhoffman80@gmail.com	
	 	
5-12). Firewalls inspect and control traffic at different layers of the TCP/IP stack, and
thus can have varying degrees of granularity in their applicability. Packet filtering
firewalls are stateless and inspect at the Internet layer for source and destination IP
addresses. Session-based firewalls maintain a session table and inspect/control
communication at the Transport layer where TCP and UDP protocols are found, which
includes the session, port number/protocol, and flags -- among other information. At the
Application layer, a firewall inspects and controls the actual application communication.
Modbus TCP commands, for example, are found in the Application layer. Therefore, to
provide granular inspection and control for Modbus TCP communication, an Application
layer firewall is required.
The level of trust is reduced as communication extends beyond the boundary of
an ICS device. The amount of risk involved in this reduction of trust is mostly dependent
on the security and medium of the communication protocol but is also dependent on the
controlled physical process. If a PLC or RTU is used for read-only monitoring of a
natural gas well, for example, the risk of compromise is less than it would be for a PLC
or RTU that controls well pressure or flow rate. To mitigate the risk of ICS systems that
are controlling critical processes, and yet are still using legacy protocols, an ICS
Application layer firewall can be used to allow only required commands per the control
application.
To understand and assess how Modbus can be restricted, a Moxa EDR-G903
model secure router was leveraged. Initially, the device was loaded with firmware
version 5.0. Upon checking with the vendor's website, version 5.4 was available and
subsequently installed. To restrict communication to the CLICK PLC specifically, the
Moxa was placed in front of the PLC using the LAN port on the device and was set to
bridge mode, also called transparent mode, which makes it appear like a switch on the
network. The Moxa WAN1 port was connected to the upstream Cisco switch with WAN2
port disconnected. Application layer firewall functionality in the Moxa comes with the
capability to inspect the Modbus commands and registers themselves. The device can
support Layer 2 Policy, Layer 3 Policy, and a Modbus Policy. The firewall assessment
began by configuring Layer 3 rules to allow unobstructed Modbus communication and
@ 2021 SANS Institute Author Retains Full Rights
©
2
0
2
0
T
h
e
S
A
N
S
I
n
s
t
i
t
u
t
e
,
A
u
t
h
o
r
R
e
t
a
i
n
s
F
u
l
l
R
i
g
h
t
s
© 2020 The SANS Institute Author retainsfull rights.
Mitigating Vulnerable ICS Protocols 22
	
Michael	Hoffman,	mjhoffman80@gmail.com	
	 	
enable programming software from the ICS612 VM to communicate with the CLICK
PLC, as shown in Figure 21.
Figure 21. Initial settings applied to the Moxa firewall
As expected, the ctmodbus tool reveals that read/write functionality from an
external network is possible. Figure 22 shows a successful Read Input Register at
memory location 103, which returns a value of 07e4 hex value (2020 decimal). The value
of 2019 (07e3 hex) is written back to the register, and then the value is re-read as 07e3,
which indicates the value was changed.
Figure 22. External register manipulation
The next assessment was to tighten up the connection setting and only allow port 502
connectivity between the CLICK PLC at 172.16.11.22 and CybatiWorks PI kit at
172.16.11.13 address, as shown in Figure 23.
@ 2021 SANS Institute Author Retains Full Rights
©
2
0
2
0
T
h
e
S
A
N
S
I
n
s
t
i
t
u
t
e
,
A
u
t
h
o
r
R
e
t
a
i
n
s
F
u
l
l
R
i
g
h
t
s
© 2020 The SANS Institute Author retainsfull rights.
Mitigating Vulnerable ICS Protocols 23
	
Michael	Hoffman,	mjhoffman80@gmail.com	
	 	
Figure 23. Additional settings applied for Layer 3 firewall configuration
With firewall source/destination physical ports and source/destination IP addresses
assigned on rule 1, the connectivity was no longer able to be established from the
ctmodbus application. This is illustrated by Wireshark capturing TCP SYN packets sent
from the ControlThingsIO VM at 172.16.6.52 to the PLC at 172.16.11.22, but there was
no connection established as shown in Figure 24.
Figure 24. Failed TCP session creation due to tightening firewall rules.
Although a Man In The Middle (MITM) attack on Modbus TCP, as discussed by Sanche,
could still be leveraged with this connection, the placement of the remote laptop is
outside of the ICS VLAN (2017). Therefore, a MITM attack will not natively work. If an
attacker was able to pivot down to a functional level 1 zone or abuse a trusted connection
between a Modbus master station and slave, additional firewall restrictions would be
required to protect the ICS device endpoint(s).
Applying additional protections for Modbus TCP is performed at the Application
layer. However, before creating a firewall ruleset, the underlying function codes and
ranges for the given ICS devices must be understood. For Modbus TCP, this information
is typically found by reviewing Modbus master pulling configuration, and Modbus slave
mapping tables. For the systems under assessment, this information was found by
@ 2021 SANS Institute Author Retains Full Rights

Recommended for you

Ii2514901494
Ii2514901494Ii2514901494
Ii2514901494

This document discusses the Address Resolution Protocol (ARP) and its use in intrusion detection systems. It proposes a standardized 64-byte ARP protocol structure to more easily capture ARP packets from a network. The structure includes fields for frame information, destination and source addresses, ARP type details, and sender/target MAC and IP addresses. This standardized structure could be integrated into network monitoring to help detect intrusions without affecting normal data transfer processes. Overall, the document aims to optimize the ARP sequence for use in intrusion detection systems.

ijera(www.ijera.com)international journal of engin
chile-2015 (2)
chile-2015 (2)chile-2015 (2)
chile-2015 (2)

The document discusses cybersecurity issues related to critical infrastructure sectors. It notes that there are 16 critical infrastructure sectors designated by the US Department of Homeland Security that are vital to national security and safety. These sectors include chemical, communications, dams, emergency services, financial services, government facilities, information technology, transportation, and others. The document expresses concern about the lack of security for industrial control systems and SCADA systems that monitor and control critical infrastructure. It provides examples of past cyber attacks on these systems and notes that the majority of attacks in 2014 targeted advanced persistent threats. The document concludes that as industrial systems increasingly connect to the internet and migrate to web-based interfaces, they represent an growing security risk due to vulnerabilities.

Practical analysis of the cybersecurity of European smart grids
Practical analysis of the cybersecurity of European smart gridsPractical analysis of the cybersecurity of European smart grids
Practical analysis of the cybersecurity of European smart grids

This paper summarizes the experience gained during a series of practical cybersecurity assessments of various components of Europe’s smart electrical grids.

cybersecuritysmartgridscada
©
2
0
2
0
T
h
e
S
A
N
S
I
n
s
t
i
t
u
t
e
,
A
u
t
h
o
r
R
e
t
a
i
n
s
F
u
l
l
R
i
g
h
t
s
© 2020 The SANS Institute Author retainsfull rights.
Mitigating Vulnerable ICS Protocols 24
	
Michael	Hoffman,	mjhoffman80@gmail.com	
	 	
reviewing the modified CybatiWorks Modbus mapping table, as shown in Figure 25.
Figure 25. CybatiWorks REXYGEN modified Modbus configuration
Mapping tables are used in ICS devices as a bridge between Modbus register or coil
addresses and underlying logic or programs. To incorporate the principle of least
privilege in the Moxa firewall ruleset, the CybatiWorks Modbus write and read register
ranges of 0-10 and 20-36, respectively, are mirrored. The resulting firewall rules
configured in the Moxa are shown in Figure 26.
CybatiWorks	Control	Area	
The	CLICK	PLC	writes	to	
these	Registers	
CybatiWorks	Status	Area	
The	CLICK	PLC	reads	
these	Registers	
@ 2021 SANS Institute Author Retains Full Rights
©
2
0
2
0
T
h
e
S
A
N
S
I
n
s
t
i
t
u
t
e
,
A
u
t
h
o
r
R
e
t
a
i
n
s
F
u
l
l
R
i
g
h
t
s
© 2020 The SANS Institute Author retainsfull rights.
Mitigating Vulnerable ICS Protocols 25
	
Michael	Hoffman,	mjhoffman80@gmail.com	
	 	
Figure 26. Moxa Firewall configuration Modbus specific registers
A unique requirement for the Moxa Modbus Application Layer rules is that a response
from the slave device must be explicitly listed on a reverse rule -- despite having an
underlying established TCP session. The first rule at Index 1 is for a Read Holding
Register request from the CLICK PLC at 172.16.11.22 with an address range of 20-36.
The slave response is listed at Index 2, with the traffic direction reversed but using the
same function code. For Modbus writes, Index 3 allows function code 16, or Write
Multiple Registers, with an address range of 0-10. This rule matches both the
CybatiWorks Modbus configuration and the Click PLC Modbus write Configuration,
shown in Figure 27. Due to the one-off addressing of the PLC, write register addressing
starts at 400001 with 11 master addresses. This translates to a range of 0-10, or 11
addresses starting at address 0. The same reverse rule requirement holds for Modbus
writes, and is the purpose for the rule at Index 4.
@ 2021 SANS Institute Author Retains Full Rights
©
2
0
2
0
T
h
e
S
A
N
S
I
n
s
t
i
t
u
t
e
,
A
u
t
h
o
r
R
e
t
a
i
n
s
F
u
l
l
R
i
g
h
t
s
© 2020 The SANS Institute Author retainsfull rights.
Mitigating Vulnerable ICS Protocols 26
	
Michael	Hoffman,	mjhoffman80@gmail.com	
	 	
Figure 27. Click PLC Modbus Write block configuration
An important area to note is that the firewall rule(s) must incorporate the entire range of
coils or registers requested or written. If a Modbus firewall inspection rule range is
shorter than the Modbus function range requested by the master, the firewall will drop the
entire packet. This is illustrated by increasing the number of master address from 17 to
18, as shown in Figure 28.
	
Figure 28. Click PLC Modbus Write block configuration
@ 2021 SANS Institute Author Retains Full Rights
©
2
0
2
0
T
h
e
S
A
N
S
I
n
s
t
i
t
u
t
e
,
A
u
t
h
o
r
R
e
t
a
i
n
s
F
u
l
l
R
i
g
h
t
s
© 2020 The SANS Institute Author retainsfull rights.
Mitigating Vulnerable ICS Protocols 27
	
Michael	Hoffman,	mjhoffman80@gmail.com	
	 	
Before this assessment, however, the Wireshark connection was moved to the network
tap between the CLICK PLC and Moxa firewall to capture the firewall response to the
modified Modbus request values. As shown in Figure 29, when the request word count
was changed from 17 to 18 in the PLC configuration, the Moxa firewall detects this
change and closes the connection to the CybatiWorks PI. The closed connection was also
immediately evident on the PLC HMI as the traffic light screen stopped updating.
Figure 29. TCP session termination from word count change.
This assessment shows that by leveraging ICS protocol aware application layer firewalls
and configuring granular rule sets, the control of insecure ICS protocol device
communication and, therefore, the security of ICS devices themselves is significantly
increased. However, increased security is only fully realized when a proper reference
architecture, such as the Purdue Model, is implemented, that provides layers of security
controls to protect these critical devices from systems and communication above the
control network and beyond the ICS.
@ 2021 SANS Institute Author Retains Full Rights

Recommended for you

Sb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinetSb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinet

This document provides an overview of how Fortinet solutions can help secure industrial control systems (ICS) in accordance with IEC 62443 standards. It describes common ICS vulnerabilities and challenges, and recommends implementing network segmentation, access controls, and multi-layered security using Fortinet products to monitor traffic and enforce security policies across different ICS zones. Specific Fortinet products mentioned include the FortiGate firewall, FortiAuthenticator for authentication, and FortiAnalyzer for logging and reporting.

Challenges and Solution to Mitigate the cyber-attack on Critical Infrastruct...
Challenges and Solution to Mitigate the cyber-attack  on Critical Infrastruct...Challenges and Solution to Mitigate the cyber-attack  on Critical Infrastruct...
Challenges and Solution to Mitigate the cyber-attack on Critical Infrastruct...

SCADA systems control some of the most vital infrastructure in industrial and energy sectors, from oil and gas pipelines to nuclear facilities to water treatment plants. Critical infrastructure is defined as the physical and IT assets, networks and services that if disrupted or destroyed would have a serious impact on the health, security, or economic wellbeing of citizens and the efficient functioning of a country’s government.

ot securitycritical infrastructurecyber security
Security Issues in SCADA based Industrial Control Systems
Security Issues in SCADA based Industrial Control Systems Security Issues in SCADA based Industrial Control Systems
Security Issues in SCADA based Industrial Control Systems

This document discusses security concerns in industrial control systems. It provides an overview of industrial control systems (ICS) and SCADA systems, which are widely used to control infrastructure systems. It outlines several vulnerabilities in ICS, including issues with legacy systems not being designed with modern cybersecurity threats in mind. Specific threats like zero-day vulnerabilities, non-prioritized tasks, and database/communication protocol issues are examined. The conclusion states that additional digital security techniques are needed to protect critical infrastructure control systems.

scada.security concerns in industrial control systemsics
©
2
0
2
0
T
h
e
S
A
N
S
I
n
s
t
i
t
u
t
e
,
A
u
t
h
o
r
R
e
t
a
i
n
s
F
u
l
l
R
i
g
h
t
s
© 2020 The SANS Institute Author retainsfull rights.
Mitigating Vulnerable ICS Protocols 28
	
Michael	Hoffman,	mjhoffman80@gmail.com	
	 	
4. Recommendations and Implications
The mitigating controls discussed in this paper are focused on preventative and, in
some small way, recovery controls to deal with the prevalent use of insecure ICS
protocols in lower functional levels of the Purdue Model. A commonly heard motto in the
security community says, “prevention is ideal, but detection is a must.” However,
detection builds on the foundation of prevention. Therefore, architectural and passive
defenses, including device hardening, patching/updating firmware, implementing secure
logic and programs, employing network and zone segmentation, among others, provide a
higher value of return and lay the foundation for detection capabilities and ultimately
Active Defense (2018). Lee describes, “..Active Defense is more achievable and efficient
when done in an environment with proper Architecture and Passive Defenses (2015, p.
4).” With preventative and architectural controls designed and adequately maintained,
defenders can then leverage tools such as Network Security Monitoring (NSM) to detect
adversarial behaviors in ICS networks and respond to attempted attacks.
4.1. Recommendations for Practice
	
Many of the mitigation controls discussed can be performed on operational
environments, but there is always risk involved with making any changes to PLCs, RTUs,
or other ICS devices. Additionally, making network changes can disrupt communication
that could cause loss of view or control. Therefore, the most opportune time to make ICS
devices or network modifications is during planned operational outages with scheduled
maintenance windows. However, this does not prevent a thorough assessment of the asset
owner's and operator's ICS devices and systems to understand their security posture and
threat landscape and begin to plan and take necessary mitigating actions.
For new installations or upgrades, ICS devices should be implemented with
vendors recommended security practices for hardening, programming, and network
restrictions. Finally, if devices have the option of using a more secure protocol, it should
be reviewed to determine applicability for the environment and used if possible.
	
	
@ 2021 SANS Institute Author Retains Full Rights
©
2
0
2
0
T
h
e
S
A
N
S
I
n
s
t
i
t
u
t
e
,
A
u
t
h
o
r
R
e
t
a
i
n
s
F
u
l
l
R
i
g
h
t
s
© 2020 The SANS Institute Author retainsfull rights.
Mitigating Vulnerable ICS Protocols 29
	
Michael	Hoffman,	mjhoffman80@gmail.com	
	 	
4.2. Implications for Future Research
The ICS security community would benefit from researching device security
settings and controls, programming and logic, and network perimeter security -- each in
more detail to further understand vulnerability and mitigations and feed those learnings
back to the community. Additionally, this research reviewed only one PLC vendor, and
thus, a further refined study could be carried out for other vendors as well. Finally,
although Modbus TCP is widely used and easy to assess, other protocols, such as
EtherNet/IP or DNP3, would be good candidates to review and contrast with their secure
versions.
5. Conclusion
Despite the increasing trend of attacks on ICS systems, vulnerable ICS protocols are
still in use and are even leveraged in new ICS projects. However, ICS owners and
operators do have options to mitigate vulnerabilities inherent in these insecure protocols.
Research performed on ICS device security settings, secure programming practices, and
deploying network security barriers using student kits from SANS ICS515 and ICS612
courses show that it is possible to increase the security posture of ICS devices and their
respective Modbus TCP communications. Although these are preventative mitigations,
they enable a strong foundation to build a defensible approach in ICS environments that
directly impacts the controlled process. Deploying these mitigations is ultimately
dependent on the level of risk in a respective ICS environment. However, asset owners
and operators are encouraged to assess their environment to understand the state of ICS
devices, protocols, and communication flows and carry out any remediation activities to
ensure critical infrastructure is kept operational today and into the future in light of the
increasing cyber threats to ICS.
@ 2021 SANS Institute Author Retains Full Rights
©
2
0
2
0
T
h
e
S
A
N
S
I
n
s
t
i
t
u
t
e
,
A
u
t
h
o
r
R
e
t
a
i
n
s
F
u
l
l
R
i
g
h
t
s
© 2020 The SANS Institute Author retainsfull rights.
Mitigating Vulnerable ICS Protocols 30
	
Michael	Hoffman,	mjhoffman80@gmail.com	
	 	
6. Appendices
The supporting device configurations used throughout this research are posted in
GitHub and can be found at the following link:
https://github.com/Eirene77/ICSProtocolLab
@ 2021 SANS Institute Author Retains Full Rights
©
2
0
2
0
T
h
e
S
A
N
S
I
n
s
t
i
t
u
t
e
,
A
u
t
h
o
r
R
e
t
a
i
n
s
F
u
l
l
R
i
g
h
t
s
© 2020 The SANS Institute Author retainsfull rights.
Mitigating Vulnerable ICS Protocols 31
	
Michael	Hoffman,	mjhoffman80@gmail.com	
	 	
References
Allen-Bradley. (2018, February). Documents. Retrieved from Rockwell Automation:
https://literature.rockwellautomation.com/idc/groups/literature/documents/pm/175
6-pm004_-en-p.pdf
Allen-Bradley. (2018, November). Literature. Retrieved from Rockwell Automation:
https://literature.rockwellautomation.com/idc/groups/literature/documents/pm/175
6-pm016_-en-p.pdf
Assante, M. J., & Lee, R. M. (2015, October). Reading Room. Retrieved from SANS:
https://www.sans.org/reading-room/whitepapers/ICS/industrial-control-system-
cyber-kill-chain-36297
Bodungen, C. E., Singer, B. L., Shbeeb, A., Hilt, S., & Wilhoit, K. (2017). Hacking
Expose, Industrial Control Systems: ICS and SCADA Security Secrets &
Solutions. New York: McGraw Hill Education.
Center for Internet Security. (2020, January 4). Secure Configuration for Hardware and
Software on Mobile Devices, Laptops, Workstations and Servers. Retrieved from
Center for Internet Security: https://www.cisecurity.org/controls/secure-
configuration-for-hardware-and-software-on-mobile-devices-laptops-
workstations-and-servers/
CISA. (2020, January 11). Control System Firewall. Retrieved from US-CERT:
https://www.us-cert.gov/ics/Control_System_Firewall-Definition.html
ControlThings I/O. (2020, January 2). Tools. Retrieved from ControlThings.io:
https://www.controlthings.io/tools
CSIA. (2016, September). Improving Industrial Control System Cybersecurity with
Defense-in-Depth Strategies. Retrieved from US-CERT: https://www.us-
cert.gov/sites/default/files/recommended_practices/NCCIC_ICS-
CERT_Defense_in_Depth_2016_S508C.pdf
Dragos. (2018). Year In Review 2018. Retrieved from Dragos: https://dragos.com/wp-
content/uploads/yir-ics-vulnerabilities-2018.pdf
Draias, Z., Serhrouchni, A., & Vogel, O. (2015, July). Taxonomy-of-attacks-on-
Industrial-control-protocols. Retrieved from Research Gate:
ttps://www.researchgate.net/profile/Zakarya_Drias2/publication/283045654_Taxo
@ 2021 SANS Institute Author Retains Full Rights

Recommended for you

David Blanco ISHM 8280-2016
David Blanco ISHM 8280-2016David Blanco ISHM 8280-2016
David Blanco ISHM 8280-2016

The document discusses cyber security challenges for industrial control systems (ICS) and SCADA networks. As ICS were connected to networks and the internet, it increased opportunities for remote hacking and destruction. The disconnect between traditional IT security practices and operational needs of ICS led to vulnerabilities. Common security strategies like network isolation are no longer effective due to widespread connectivity. Recent attacks have shown that hackers can compromise ICS equipment directly and cause physical damage. The document argues industry must adopt new security technologies and policies tailored for ICS in order to address growing threats.

SCADA Systems Vulnerabilities and Blockchain Technology
SCADA Systems Vulnerabilities and Blockchain TechnologySCADA Systems Vulnerabilities and Blockchain Technology
SCADA Systems Vulnerabilities and Blockchain Technology

SCADA systems are one of the most important part of industrial operations. Before SCADA, plant personnel had to monitor and control industrial process via selector switches, pushbuttons and dials for analog signals. As manufacturing grew and sites became more remote, relays and timers were used to assist supervision. With the onset of technology and advent of network based protocols, these systems became more reliable, fast and it became easy to troubleshoot problems. Indeed progress also brings vulnerabilities, which was no new for SCADA. The IP protocols brought threat to the security of these systems. The devastation that cyber predators on SCADA can inflict, could be illustrated by the Stuxnet virus attack. This paper discusses what SCADA systems are, their uses, protocols being used by these systems, vulnerabilities and ways to combat those vulnerabilities. It focusses on the use of Blockchain Technology as a step in security of such systems. Diksha Chhonkar | Garima Pandey "SCADA Systems: Vulnerabilities and Blockchain Technology" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-4 , June 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31586.pdf Paper Url :https://www.ijtsrd.com/computer-science/computer-security/31586/scada-systems-vulnerabilities-and-blockchain-technology/diksha-chhonkar

computer securityscada systemsvulnerabilities
IJSRED-V2I2P15
IJSRED-V2I2P15IJSRED-V2I2P15
IJSRED-V2I2P15

This document discusses trends in threats to SCADA (Supervisory Control and Data Acquisition) systems. It notes that as SCADA systems increasingly use commercial off-the-shelf software and connect to the internet, they have become more vulnerable to cyber threats. The document outlines how SCADA systems work and components like RTUs, PLCs, and HMIs. It also discusses issues like the mistaken belief that SCADA systems are secure due to physical security or isolation from the internet. The conclusion suggests that as capabilities and opportunities for threats increase, the future operational environment will be more vulnerable if an actor emerges with the intent to cause harm.

©
2
0
2
0
T
h
e
S
A
N
S
I
n
s
t
i
t
u
t
e
,
A
u
t
h
o
r
R
e
t
a
i
n
s
F
u
l
l
R
i
g
h
t
s
© 2020 The SANS Institute Author retainsfull rights.
Mitigating Vulnerable ICS Protocols 32
	
Michael	Hoffman,	mjhoffman80@gmail.com	
	 	
nomy_of_attacks_on_Industrial_control_protocols/links/568b808108ae1e63f1fce
049/Taxonomy-of-attacks-on-Industrial-control-protocols.pdf
Langer, R. (2013, November). Resources. Retrieved from Langner:
https://www.langner.com/wp-content/uploads/2017/03/to-kill-a-centrifuge.pdf
Langner. (2019, February 12). THE FIVE THINGS YOU NEED TO KNOW ABOUT
OT/ICS VULNERABILITY AND PATCH MANAGEMENT. Retrieved from
Langner: https://www.langner.com/2019/02/the-five-things-you-need-to-know-
about-ot-ics-vulnerability-and-patch-management/
Lee, R. M. (2015, September 1). The Sliding Scale of Cyber Security. Retrieved from
SANS: https://www.sans.org/reading-room/whitepapers/ActiveDefense/sliding-
scale-cyber-security-36240
Lee, R. M. (2017). White Papers. Retrieved from Dragos: https://dragos.com/wp-
content/uploads/CrashOverride-01.pdf
Lee, R. M. (2018). ICS515 | ICS Active Defense and Incident Response. Bethesda: SANS
Institute.
Lee, R. M., Assante, M. J., & Conway, T. (2014, December 30). Industrial Control
Systems Library. Retrieved from SANS: https://ics.sans.org/media/ICS-CPPE-
case-Study-2-German-Steelworks_Facility.pdf
McConnell, S. (2004). Code Complete. Redmond: Microsoft Press.
Mostia, W. L. (2019, January 4). Introduction to Modbus. Retrieved from Control Global:
https://www.controlglobal.com/articles/2019/introduction-to-modbus/
NIST. (2015, May). Guide to Industrial Control Systems (ICS) Security. Retrieved from
NIST: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-
82r2.pdf
NIST. (2018, April 16). Cybersecurity Framework. Retrieved from NIST:
https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf
OPC Foundation. (2020, January 4). OPC UA Information Models. Retrieved from OPC
Foundations: https://opcfoundation.org/developer-tools/specifications-opc-ua-
information-models
@ 2021 SANS Institute Author Retains Full Rights
©
2
0
2
0
T
h
e
S
A
N
S
I
n
s
t
i
t
u
t
e
,
A
u
t
h
o
r
R
e
t
a
i
n
s
F
u
l
l
R
i
g
h
t
s
© 2020 The SANS Institute Author retainsfull rights.
Mitigating Vulnerable ICS Protocols 33
	
Michael	Hoffman,	mjhoffman80@gmail.com	
	 	
OWASP. (2020, January 6). Input Validation Cheat Sheet. Retrieved from OWASP:
https://cheatsheetseries.owasp.org/cheatsheets/Input_Validation_Cheat_Sheet.htm
l
OWASP Top Ten. (2020). Top 10 Web Application Security Risks. Retrieved from
OWASP: https://owasp.org/www-project-top-ten/
Rinaldi, J. S. (n.d.). Modbus. Retrieved from Real Time Automation:
https://www.rtautomation.com/technologies/modbus/
Rockwell Automation. (2019, July 22). Press Release Details. Retrieved from Rockwell
Automation: https://ir.rockwellautomation.com/press-releases/press-releases-
details/2019/New-Communication-Module-With-CIP-Security-Can-Reduce-
Risks-Boost-Performance-/default.aspx
Sanchez, G. (2017, October 20). Man-In-The-Middle Attack Against Modbus TCP
Illustrated with Wireshark. Retrieved from SANS Reading Room:
https://www.sans.org/reading-room/whitepapers/ICS/man-in-the-middle-attack-
modbus-tcp-illustrated-wireshark-38095
Scott, A. (2015). Learning RSLogix 5000 Programming. Birmingham, UK: Packt
Publishing.
Shearer, J., Dely, J., Conway, T., & Robinson, C. (2019). ICS612 | ICS Cyber Security
In-Depth. Bethesda: SANS Institute.
Siemens. (2016, March 20). Product Support. Retrieved from Siemens:
https://cache.industry.siemens.com/dl/files/010/90885010/att_959937/v1/7743184
6_Security_SIMATIC_DOKU_V20_en.pdf
Slowik, J. (2019). Whitepapers. Retrieved from Dragos: https://dragos.com/wp-
content/uploads/Evolution-of-ICS-Attacks-and-the-Prospects-for-Future-
Disruptive-Events-Joseph-Slowik-1.pdf
@ 2021 SANS Institute Author Retains Full Rights

More Related Content

What's hot

RSAC 2021 Spelunking Through the Steps of a Control System Hack
RSAC 2021 Spelunking Through the Steps of a Control System HackRSAC 2021 Spelunking Through the Steps of a Control System Hack
RSAC 2021 Spelunking Through the Steps of a Control System Hack
Dan Gunter
 
3778975074 january march 2015 1
3778975074 january march 2015 13778975074 january march 2015 1
3778975074 january march 2015 1
nicfs
 
Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and VulnerabilitiesMeletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis MPhil/MRes/BSc
 
169
169169
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkA Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
IOSR Journals
 
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
Underwriters Laboratories
 
Ijnsa050214
Ijnsa050214Ijnsa050214
Ijnsa050214
IJNSA Journal
 
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
IJCNCJournal
 
Mobile slide
Mobile slideMobile slide
Mobile slide
Aman singh
 
Evaluation of enhanced security solutions in
Evaluation of enhanced security solutions inEvaluation of enhanced security solutions in
Evaluation of enhanced security solutions in
IJNSA Journal
 
D03302030036
D03302030036D03302030036
D03302030036
theijes
 
Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...
Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...
Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...
IRJET Journal
 
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...
IJNSA Journal
 
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...
IJNSA Journal
 
Efficient String Matching Algorithm for Intrusion Detection
Efficient String Matching Algorithm for Intrusion DetectionEfficient String Matching Algorithm for Intrusion Detection
Efficient String Matching Algorithm for Intrusion Detection
editor1knowledgecuddle
 
hashdays 2011: Felix 'FX' Lindner - Targeted Industrial Control System Attack...
hashdays 2011: Felix 'FX' Lindner - Targeted Industrial Control System Attack...hashdays 2011: Felix 'FX' Lindner - Targeted Industrial Control System Attack...
hashdays 2011: Felix 'FX' Lindner - Targeted Industrial Control System Attack...
Area41
 
Wrapped rsa cryptography check on window
Wrapped rsa cryptography check on windowWrapped rsa cryptography check on window
Wrapped rsa cryptography check on window
iaemedu
 
A Collaborative Intrusion Detection System for Cloud Computing
A Collaborative Intrusion Detection System for Cloud ComputingA Collaborative Intrusion Detection System for Cloud Computing
A Collaborative Intrusion Detection System for Cloud Computing
ijsrd.com
 
Ii2514901494
Ii2514901494Ii2514901494
Ii2514901494
IJERA Editor
 

What's hot (19)

RSAC 2021 Spelunking Through the Steps of a Control System Hack
RSAC 2021 Spelunking Through the Steps of a Control System HackRSAC 2021 Spelunking Through the Steps of a Control System Hack
RSAC 2021 Spelunking Through the Steps of a Control System Hack
 
3778975074 january march 2015 1
3778975074 january march 2015 13778975074 january march 2015 1
3778975074 january march 2015 1
 
Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and VulnerabilitiesMeletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
 
169
169169
169
 
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkA Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
 
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...
 
Ijnsa050214
Ijnsa050214Ijnsa050214
Ijnsa050214
 
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
DEPLOYMENT OF INTRUSION PREVENTION SYSTEM ON MULTI-CORE PROCESSOR BASED SECUR...
 
Mobile slide
Mobile slideMobile slide
Mobile slide
 
Evaluation of enhanced security solutions in
Evaluation of enhanced security solutions inEvaluation of enhanced security solutions in
Evaluation of enhanced security solutions in
 
D03302030036
D03302030036D03302030036
D03302030036
 
Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...
Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...
Detecting Victim Systems In Client Networks Using Coarse Grained Botnet Algor...
 
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...
 
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...
RESOLVING NETWORK DEFENSE CONFLICTS WITH ZERO TRUST ARCHITECTURES AND OTHER E...
 
Efficient String Matching Algorithm for Intrusion Detection
Efficient String Matching Algorithm for Intrusion DetectionEfficient String Matching Algorithm for Intrusion Detection
Efficient String Matching Algorithm for Intrusion Detection
 
hashdays 2011: Felix 'FX' Lindner - Targeted Industrial Control System Attack...
hashdays 2011: Felix 'FX' Lindner - Targeted Industrial Control System Attack...hashdays 2011: Felix 'FX' Lindner - Targeted Industrial Control System Attack...
hashdays 2011: Felix 'FX' Lindner - Targeted Industrial Control System Attack...
 
Wrapped rsa cryptography check on window
Wrapped rsa cryptography check on windowWrapped rsa cryptography check on window
Wrapped rsa cryptography check on window
 
A Collaborative Intrusion Detection System for Cloud Computing
A Collaborative Intrusion Detection System for Cloud ComputingA Collaborative Intrusion Detection System for Cloud Computing
A Collaborative Intrusion Detection System for Cloud Computing
 
Ii2514901494
Ii2514901494Ii2514901494
Ii2514901494
 

Similar to Vulnerabilities on the Wire: Mitigations for Insecure ICS Device Communication

chile-2015 (2)
chile-2015 (2)chile-2015 (2)
chile-2015 (2)
Massimiliano Falcinelli
 
Practical analysis of the cybersecurity of European smart grids
Practical analysis of the cybersecurity of European smart gridsPractical analysis of the cybersecurity of European smart grids
Practical analysis of the cybersecurity of European smart grids
Sergey Gordeychik
 
Sb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinetSb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinet
Ivan Carmona
 
Challenges and Solution to Mitigate the cyber-attack on Critical Infrastruct...
Challenges and Solution to Mitigate the cyber-attack  on Critical Infrastruct...Challenges and Solution to Mitigate the cyber-attack  on Critical Infrastruct...
Challenges and Solution to Mitigate the cyber-attack on Critical Infrastruct...
Abhishek Goel
 
Security Issues in SCADA based Industrial Control Systems
Security Issues in SCADA based Industrial Control Systems Security Issues in SCADA based Industrial Control Systems
Security Issues in SCADA based Industrial Control Systems
aswanthmrajeev112
 
David Blanco ISHM 8280-2016
David Blanco ISHM 8280-2016David Blanco ISHM 8280-2016
David Blanco ISHM 8280-2016
David Blanco
 
SCADA Systems Vulnerabilities and Blockchain Technology
SCADA Systems Vulnerabilities and Blockchain TechnologySCADA Systems Vulnerabilities and Blockchain Technology
SCADA Systems Vulnerabilities and Blockchain Technology
ijtsrd
 
IJSRED-V2I2P15
IJSRED-V2I2P15IJSRED-V2I2P15
IJSRED-V2I2P15
IJSRED
 
Reinforcement learning-based security schema mitigating manin-the-middle atta...
Reinforcement learning-based security schema mitigating manin-the-middle atta...Reinforcement learning-based security schema mitigating manin-the-middle atta...
Reinforcement learning-based security schema mitigating manin-the-middle atta...
IJECEIAES
 
Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices
IJECEIAES
 
Cloud assisted io t-based scada systems security- a review of the state of th...
Cloud assisted io t-based scada systems security- a review of the state of th...Cloud assisted io t-based scada systems security- a review of the state of th...
Cloud assisted io t-based scada systems security- a review of the state of th...
redpel dot com
 
ICSA 2019 Architectural Security Weaknesses in Industrial Control Systems
ICSA 2019 Architectural Security Weaknesses in Industrial Control SystemsICSA 2019 Architectural Security Weaknesses in Industrial Control Systems
ICSA 2019 Architectural Security Weaknesses in Industrial Control Systems
DanielleGonzalez25
 
SCADA White Paper March2012
SCADA White Paper March2012SCADA White Paper March2012
SCADA White Paper March2012
James Collinge, CISSP
 
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
IRJET Journal
 
Cloud computing challenges and solutions
Cloud computing challenges and solutionsCloud computing challenges and solutions
Cloud computing challenges and solutions
IJCNCJournal
 
IRJET- Detection and Isolation of Zombie Attack under Cloud Computing
IRJET- Detection and Isolation of Zombie Attack under Cloud ComputingIRJET- Detection and Isolation of Zombie Attack under Cloud Computing
IRJET- Detection and Isolation of Zombie Attack under Cloud Computing
IRJET Journal
 
Smart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security IssuesSmart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security Issues
journalBEEI
 
Robust Cyber Security for Power Utilities
Robust Cyber Security for Power UtilitiesRobust Cyber Security for Power Utilities
Robust Cyber Security for Power Utilities
Nir Cohen
 
Cryptography and Authentication Placement to Provide Secure Channel for SCADA...
Cryptography and Authentication Placement to Provide Secure Channel for SCADA...Cryptography and Authentication Placement to Provide Secure Channel for SCADA...
Cryptography and Authentication Placement to Provide Secure Channel for SCADA...
CSCJournals
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
Patricia M Watson
 

Similar to Vulnerabilities on the Wire: Mitigations for Insecure ICS Device Communication (20)

chile-2015 (2)
chile-2015 (2)chile-2015 (2)
chile-2015 (2)
 
Practical analysis of the cybersecurity of European smart grids
Practical analysis of the cybersecurity of European smart gridsPractical analysis of the cybersecurity of European smart grids
Practical analysis of the cybersecurity of European smart grids
 
Sb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinetSb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinet
 
Challenges and Solution to Mitigate the cyber-attack on Critical Infrastruct...
Challenges and Solution to Mitigate the cyber-attack  on Critical Infrastruct...Challenges and Solution to Mitigate the cyber-attack  on Critical Infrastruct...
Challenges and Solution to Mitigate the cyber-attack on Critical Infrastruct...
 
Security Issues in SCADA based Industrial Control Systems
Security Issues in SCADA based Industrial Control Systems Security Issues in SCADA based Industrial Control Systems
Security Issues in SCADA based Industrial Control Systems
 
David Blanco ISHM 8280-2016
David Blanco ISHM 8280-2016David Blanco ISHM 8280-2016
David Blanco ISHM 8280-2016
 
SCADA Systems Vulnerabilities and Blockchain Technology
SCADA Systems Vulnerabilities and Blockchain TechnologySCADA Systems Vulnerabilities and Blockchain Technology
SCADA Systems Vulnerabilities and Blockchain Technology
 
IJSRED-V2I2P15
IJSRED-V2I2P15IJSRED-V2I2P15
IJSRED-V2I2P15
 
Reinforcement learning-based security schema mitigating manin-the-middle atta...
Reinforcement learning-based security schema mitigating manin-the-middle atta...Reinforcement learning-based security schema mitigating manin-the-middle atta...
Reinforcement learning-based security schema mitigating manin-the-middle atta...
 
Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices
 
Cloud assisted io t-based scada systems security- a review of the state of th...
Cloud assisted io t-based scada systems security- a review of the state of th...Cloud assisted io t-based scada systems security- a review of the state of th...
Cloud assisted io t-based scada systems security- a review of the state of th...
 
ICSA 2019 Architectural Security Weaknesses in Industrial Control Systems
ICSA 2019 Architectural Security Weaknesses in Industrial Control SystemsICSA 2019 Architectural Security Weaknesses in Industrial Control Systems
ICSA 2019 Architectural Security Weaknesses in Industrial Control Systems
 
SCADA White Paper March2012
SCADA White Paper March2012SCADA White Paper March2012
SCADA White Paper March2012
 
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...IRJET-  	  Security Analysis and Improvements to IoT Communication Protocols ...
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
 
Cloud computing challenges and solutions
Cloud computing challenges and solutionsCloud computing challenges and solutions
Cloud computing challenges and solutions
 
IRJET- Detection and Isolation of Zombie Attack under Cloud Computing
IRJET- Detection and Isolation of Zombie Attack under Cloud ComputingIRJET- Detection and Isolation of Zombie Attack under Cloud Computing
IRJET- Detection and Isolation of Zombie Attack under Cloud Computing
 
Smart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security IssuesSmart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security Issues
 
Robust Cyber Security for Power Utilities
Robust Cyber Security for Power UtilitiesRobust Cyber Security for Power Utilities
Robust Cyber Security for Power Utilities
 
Cryptography and Authentication Placement to Provide Secure Channel for SCADA...
Cryptography and Authentication Placement to Provide Secure Channel for SCADA...Cryptography and Authentication Placement to Provide Secure Channel for SCADA...
Cryptography and Authentication Placement to Provide Secure Channel for SCADA...
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
 

More from Muhammad FAHAD

Intrusion Discovery Cheat Sheet for Linux
Intrusion Discovery Cheat Sheet for LinuxIntrusion Discovery Cheat Sheet for Linux
Intrusion Discovery Cheat Sheet for Linux
Muhammad FAHAD
 
CISA GOV - Seven Steps to Effectively Defend ICS
CISA GOV - Seven Steps to Effectively Defend ICSCISA GOV - Seven Steps to Effectively Defend ICS
CISA GOV - Seven Steps to Effectively Defend ICS
Muhammad FAHAD
 
Computer Security Incident Handling Guide
Computer Security Incident Handling GuideComputer Security Incident Handling Guide
Computer Security Incident Handling Guide
Muhammad FAHAD
 
Steps to Improve Cyber Security of SCADA Networks by U.S. Department of Energy
Steps to Improve Cyber Security of SCADA Networks by U.S. Department of EnergySteps to Improve Cyber Security of SCADA Networks by U.S. Department of Energy
Steps to Improve Cyber Security of SCADA Networks by U.S. Department of Energy
Muhammad FAHAD
 
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary ReadingThe Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
Muhammad FAHAD
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability Management
Muhammad FAHAD
 
The Top 20 Cyberattacks on Industrial Control Systems
The Top 20 Cyberattacks on Industrial Control SystemsThe Top 20 Cyberattacks on Industrial Control Systems
The Top 20 Cyberattacks on Industrial Control Systems
Muhammad FAHAD
 

More from Muhammad FAHAD (7)

Intrusion Discovery Cheat Sheet for Linux
Intrusion Discovery Cheat Sheet for LinuxIntrusion Discovery Cheat Sheet for Linux
Intrusion Discovery Cheat Sheet for Linux
 
CISA GOV - Seven Steps to Effectively Defend ICS
CISA GOV - Seven Steps to Effectively Defend ICSCISA GOV - Seven Steps to Effectively Defend ICS
CISA GOV - Seven Steps to Effectively Defend ICS
 
Computer Security Incident Handling Guide
Computer Security Incident Handling GuideComputer Security Incident Handling Guide
Computer Security Incident Handling Guide
 
Steps to Improve Cyber Security of SCADA Networks by U.S. Department of Energy
Steps to Improve Cyber Security of SCADA Networks by U.S. Department of EnergySteps to Improve Cyber Security of SCADA Networks by U.S. Department of Energy
Steps to Improve Cyber Security of SCADA Networks by U.S. Department of Energy
 
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary ReadingThe Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability Management
 
The Top 20 Cyberattacks on Industrial Control Systems
The Top 20 Cyberattacks on Industrial Control SystemsThe Top 20 Cyberattacks on Industrial Control Systems
The Top 20 Cyberattacks on Industrial Control Systems
 

Recently uploaded

York St John University
York St John UniversityYork St John University
York St John University
nzuyso
 
Aerocity @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Neha Singla Top Model Safe
Aerocity @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Neha Singla Top Model SafeAerocity @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Neha Singla Top Model Safe
Aerocity @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Neha Singla Top Model Safe
shruti singh$A17
 
Lajpat Nagar @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Jya Khan Top Model Safe
Lajpat Nagar @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Jya Khan Top Model SafeLajpat Nagar @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Jya Khan Top Model Safe
Lajpat Nagar @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Jya Khan Top Model Safe
bookmybebe1
 
Lenovo Laptops Extended warranty details.pdf
Lenovo Laptops Extended warranty details.pdfLenovo Laptops Extended warranty details.pdf
Lenovo Laptops Extended warranty details.pdf
DeepDebnath10
 
Lajpat Nagar @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Jina Singh Top Model Safe
Lajpat Nagar @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Jina Singh Top Model SafeLajpat Nagar @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Jina Singh Top Model Safe
Lajpat Nagar @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Jina Singh Top Model Safe
butwhat24
 
Connaught Place @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Golu Mishra Top Model Safe
Connaught Place @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Golu Mishra Top Model SafeConnaught Place @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Golu Mishra Top Model Safe
Connaught Place @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Golu Mishra Top Model Safe
kunni singh$A17
 
South Ex @ℂall @Girls ꧁❤ 9711199012 ❤꧂Fabulous sonam Mehra Top Model Safe
South Ex @ℂall @Girls ꧁❤ 9711199012 ❤꧂Fabulous sonam Mehra Top Model SafeSouth Ex @ℂall @Girls ꧁❤ 9711199012 ❤꧂Fabulous sonam Mehra Top Model Safe
South Ex @ℂall @Girls ꧁❤ 9711199012 ❤꧂Fabulous sonam Mehra Top Model Safe
anchal singh$A17
 
1.Siemens Desigo PX Controller Overview.pdf
1.Siemens Desigo PX Controller Overview.pdf1.Siemens Desigo PX Controller Overview.pdf
1.Siemens Desigo PX Controller Overview.pdf
sirajs12
 
Karol Bagh @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Arti Singh Top Model Safe
Karol Bagh @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Arti Singh Top Model SafeKarol Bagh @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Arti Singh Top Model Safe
Karol Bagh @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Arti Singh Top Model Safe
aarusi sexy model
 
Vaishali @ℂall @Girls ꧁❤ 9873777170 ❤꧂Fabulous sonam Mehra Top Model Safe
Vaishali @ℂall @Girls ꧁❤ 9873777170 ❤꧂Fabulous sonam Mehra Top Model SafeVaishali @ℂall @Girls ꧁❤ 9873777170 ❤꧂Fabulous sonam Mehra Top Model Safe
Vaishali @ℂall @Girls ꧁❤ 9873777170 ❤꧂Fabulous sonam Mehra Top Model Safe
vasudha malikmonii$A17
 
Noida Extension @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Golu Mishra Top Model Safe
Noida Extension @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Golu Mishra Top Model SafeNoida Extension @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Golu Mishra Top Model Safe
Noida Extension @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Golu Mishra Top Model Safe
poonamkumari920835
 
Aerocity @ℂall @Girls 9873940964 Fabulous Delhi Queen Top Model Safe
Aerocity @ℂall @Girls   9873940964  Fabulous Delhi Queen Top Model SafeAerocity @ℂall @Girls   9873940964  Fabulous Delhi Queen Top Model Safe
Aerocity @ℂall @Girls 9873940964 Fabulous Delhi Queen Top Model Safe
reema kushawaha
 
十大欧洲杯独赢软件-十大欧洲杯独赢软件推荐 |【​网址​🎉ac99.net🎉​】 .
十大欧洲杯独赢软件-十大欧洲杯独赢软件推荐 |【​网址​🎉ac99.net🎉​】     .十大欧洲杯独赢软件-十大欧洲杯独赢软件推荐 |【​网址​🎉ac99.net🎉​】     .
十大欧洲杯独赢软件-十大欧洲杯独赢软件推荐 |【​网址​🎉ac99.net🎉​】 .
neivesvimont156
 
Paharganj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
Paharganj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model SafePaharganj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
Paharganj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
Yukti Singh$A17
 
Greater Noida @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Vishakha Singla Top Model Safe
Greater Noida @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Vishakha Singla Top Model SafeGreater Noida @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Vishakha Singla Top Model Safe
Greater Noida @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Vishakha Singla Top Model Safe
kumkum tuteja$A17
 
Playcar electronic schematics. Designed by ComfySpace
Playcar electronic schematics. Designed by ComfySpacePlaycar electronic schematics. Designed by ComfySpace
Playcar electronic schematics. Designed by ComfySpace
Thomas Nguyen
 
RK Puram @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Jya Khan Top Model Safe
RK Puram @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Jya Khan Top Model SafeRK Puram @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Jya Khan Top Model Safe
RK Puram @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Jya Khan Top Model Safe
nikhilkumarji0156
 
Noida @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Golu Mishra Top Model Safe
Noida @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Golu Mishra Top Model SafeNoida @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Golu Mishra Top Model Safe
Noida @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Golu Mishra Top Model Safe
kunni singh$A17
 
Paharganj @ℂall @Girls ꧁❤ 9711199012 ❤꧂Fabulous sonam Mehra Top Model Safe
Paharganj @ℂall @Girls ꧁❤ 9711199012 ❤꧂Fabulous sonam Mehra Top Model SafePaharganj @ℂall @Girls ꧁❤ 9711199012 ❤꧂Fabulous sonam Mehra Top Model Safe
Paharganj @ℂall @Girls ꧁❤ 9711199012 ❤꧂Fabulous sonam Mehra Top Model Safe
pinni singh$A17
 
Nehru Place @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
Nehru Place @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model SafeNehru Place @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
Nehru Place @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
Yukti Singh$A17
 

Recently uploaded (20)

York St John University
York St John UniversityYork St John University
York St John University
 
Aerocity @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Neha Singla Top Model Safe
Aerocity @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Neha Singla Top Model SafeAerocity @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Neha Singla Top Model Safe
Aerocity @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Neha Singla Top Model Safe
 
Lajpat Nagar @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Jya Khan Top Model Safe
Lajpat Nagar @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Jya Khan Top Model SafeLajpat Nagar @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Jya Khan Top Model Safe
Lajpat Nagar @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Jya Khan Top Model Safe
 
Lenovo Laptops Extended warranty details.pdf
Lenovo Laptops Extended warranty details.pdfLenovo Laptops Extended warranty details.pdf
Lenovo Laptops Extended warranty details.pdf
 
Lajpat Nagar @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Jina Singh Top Model Safe
Lajpat Nagar @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Jina Singh Top Model SafeLajpat Nagar @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Jina Singh Top Model Safe
Lajpat Nagar @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Jina Singh Top Model Safe
 
Connaught Place @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Golu Mishra Top Model Safe
Connaught Place @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Golu Mishra Top Model SafeConnaught Place @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Golu Mishra Top Model Safe
Connaught Place @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Golu Mishra Top Model Safe
 
South Ex @ℂall @Girls ꧁❤ 9711199012 ❤꧂Fabulous sonam Mehra Top Model Safe
South Ex @ℂall @Girls ꧁❤ 9711199012 ❤꧂Fabulous sonam Mehra Top Model SafeSouth Ex @ℂall @Girls ꧁❤ 9711199012 ❤꧂Fabulous sonam Mehra Top Model Safe
South Ex @ℂall @Girls ꧁❤ 9711199012 ❤꧂Fabulous sonam Mehra Top Model Safe
 
1.Siemens Desigo PX Controller Overview.pdf
1.Siemens Desigo PX Controller Overview.pdf1.Siemens Desigo PX Controller Overview.pdf
1.Siemens Desigo PX Controller Overview.pdf
 
Karol Bagh @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Arti Singh Top Model Safe
Karol Bagh @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Arti Singh Top Model SafeKarol Bagh @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Arti Singh Top Model Safe
Karol Bagh @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Arti Singh Top Model Safe
 
Vaishali @ℂall @Girls ꧁❤ 9873777170 ❤꧂Fabulous sonam Mehra Top Model Safe
Vaishali @ℂall @Girls ꧁❤ 9873777170 ❤꧂Fabulous sonam Mehra Top Model SafeVaishali @ℂall @Girls ꧁❤ 9873777170 ❤꧂Fabulous sonam Mehra Top Model Safe
Vaishali @ℂall @Girls ꧁❤ 9873777170 ❤꧂Fabulous sonam Mehra Top Model Safe
 
Noida Extension @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Golu Mishra Top Model Safe
Noida Extension @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Golu Mishra Top Model SafeNoida Extension @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Golu Mishra Top Model Safe
Noida Extension @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Golu Mishra Top Model Safe
 
Aerocity @ℂall @Girls 9873940964 Fabulous Delhi Queen Top Model Safe
Aerocity @ℂall @Girls   9873940964  Fabulous Delhi Queen Top Model SafeAerocity @ℂall @Girls   9873940964  Fabulous Delhi Queen Top Model Safe
Aerocity @ℂall @Girls 9873940964 Fabulous Delhi Queen Top Model Safe
 
十大欧洲杯独赢软件-十大欧洲杯独赢软件推荐 |【​网址​🎉ac99.net🎉​】 .
十大欧洲杯独赢软件-十大欧洲杯独赢软件推荐 |【​网址​🎉ac99.net🎉​】     .十大欧洲杯独赢软件-十大欧洲杯独赢软件推荐 |【​网址​🎉ac99.net🎉​】     .
十大欧洲杯独赢软件-十大欧洲杯独赢软件推荐 |【​网址​🎉ac99.net🎉​】 .
 
Paharganj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
Paharganj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model SafePaharganj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
Paharganj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
 
Greater Noida @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Vishakha Singla Top Model Safe
Greater Noida @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Vishakha Singla Top Model SafeGreater Noida @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Vishakha Singla Top Model Safe
Greater Noida @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Vishakha Singla Top Model Safe
 
Playcar electronic schematics. Designed by ComfySpace
Playcar electronic schematics. Designed by ComfySpacePlaycar electronic schematics. Designed by ComfySpace
Playcar electronic schematics. Designed by ComfySpace
 
RK Puram @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Jya Khan Top Model Safe
RK Puram @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Jya Khan Top Model SafeRK Puram @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Jya Khan Top Model Safe
RK Puram @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Jya Khan Top Model Safe
 
Noida @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Golu Mishra Top Model Safe
Noida @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Golu Mishra Top Model SafeNoida @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Golu Mishra Top Model Safe
Noida @ℂall @Girls ꧁❤ 9873940964 ❤꧂VIP Golu Mishra Top Model Safe
 
Paharganj @ℂall @Girls ꧁❤ 9711199012 ❤꧂Fabulous sonam Mehra Top Model Safe
Paharganj @ℂall @Girls ꧁❤ 9711199012 ❤꧂Fabulous sonam Mehra Top Model SafePaharganj @ℂall @Girls ꧁❤ 9711199012 ❤꧂Fabulous sonam Mehra Top Model Safe
Paharganj @ℂall @Girls ꧁❤ 9711199012 ❤꧂Fabulous sonam Mehra Top Model Safe
 
Nehru Place @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
Nehru Place @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model SafeNehru Place @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
Nehru Place @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Yogita Mehra Top Model Safe
 

Vulnerabilities on the Wire: Mitigations for Insecure ICS Device Communication

  • 1. WHITE PAPER Vulnerabilities on the Wire: Mitigations for Insecure ICS Device Communication Michael Hoffman Copyright SANS Institute 2021. Author Retains Full Rights. This paper was published by SANS Institute. Reposting is not permitted without express written permission.
  • 2. © 2 0 2 0 T h e S A N S I n s t i t u t e , A u t h o r R e t a i n s F u l l R i g h t s © 2020 The SANS Institute Author retainsfull rights. Vulnerabilities on the Wire: Mitigations for Insecure ICS Device Communication GIAC (GRID) Gold Certification Author: Michael Hoffman, mjhoffman80@gmail.com Advisor: David Fletcher Accepted: 2/6/2020 Abstract Modbus TCP and other legacy ICS protocols ported over from serial communications are still widely used in many ICS verticals. Due to extended operational ICS component life, these protocols will be used for many years to come. Insecure ICS protocols allow attackers to potentially manipulate PLC code and logic values that could lead to disrupted critical system operations. These protocols are susceptible to replay attacks and unauthenticated command execution (Bodungen, Singer, Shbeeb, Hilt, & Wilhoit, 2017). This paper examines the viability of deploying PLC configuration modifications, programming best practices, and network security controls to demonstrate that it is possible to increase the difficulty for attackers to maliciously abuse ICS devices and mitigate the effects of attacks based on insecure ICS protocols. Student kits provided in SANS ICS515 and ICS612 courses form the backdrop for testing and evaluation of ICS protocols and device configurations. @ 2021 SANS Institute Author Retains Full Rights
  • 3. © 2 0 2 0 T h e S A N S I n s t i t u t e , A u t h o r R e t a i n s F u l l R i g h t s © 2020 The SANS Institute Author retainsfull rights. Mitigating Vulnerable ICS Protocols 2 Michael Hoffman, mjhoffman80@gmail.com 1. Introduction Modbus, an industrial protocol used for server to client communication, has been used for over 40 years and is still widely deployed in new ICS installations (Mostia, 2019). Modbus can be transported over serial mediums of RS232, RS485, or it can be wrapped in an IEEE 802.3 TCP segment. Within TCP, the typical implementation is Modbus Remote Terminal Unit (RTU) contained in the TCP/IP stack Application layer, which can be easily viewed in Wireshark (Sanchez, 2017). Modbus uses simple function calls combined with data range requests to read and write bits, called coils. Additionally, it can also read and write integers or floats, called registers. When engineers were encapsulating Modbus within TCP, cybersecurity concerns were nonexistent and, therefore, Modbus RTU does not have any built-in security mechanisms (Rinaldi, n.d.). From an ICS security perspective, Modbus is rife with many vulnerabilities and is subject to Probe, Scan, Flood, Authentication Bypass, Spoof, Eavesdrop, Misdirect, Read/Copy, Terminate, Execute, Modify, and Delete attacks (Draias, Serhrouchni, & Vogel, 2015) 1.1. Where Insecure ICS Protocols are Commonly Found In an ICS environment, the Modbus TCP protocol is often found near the physical processes. As shown in Figure 1, advanced field devices at level 0, such as mass flow meters and analytical instrumentation, may have Modbus TCP capability. Figure 1. ICS zone segmentation (CSIA, 2016) @ 2021 SANS Institute Author Retains Full Rights
  • 4. © 2 0 2 0 T h e S A N S I n s t i t u t e , A u t h o r R e t a i n s F u l l R i g h t s © 2020 The SANS Institute Author retainsfull rights. Mitigating Vulnerable ICS Protocols 3 Michael Hoffman, mjhoffman80@gmail.com Programmable Logic Controllers (PLCs) or RTUs comprise functional level 1, where they are used as masters or slaves based on the Modbus communication hierarchy. These devices normally house the logic that controls the physical process. Supervisory Control and Data Acquisition (SCADA), master stations, or communication gateways, such as Modbus to Open Platform Communication (OPC) servers, comprise functional level 2 and provide oversight and input to lower-level devices. Therefore, Modbus covers IEC 62443 functional layers 0 to 2 (CSIA, 2016). 1.2. ICS Attacks Leveraging Insecure Protocols Although the Modbus protocol is plagued with many vulnerabilities and is easy to exploit on its own, the difficulty in carrying out attacks on ICS systems lies within the loose relationship between Modbus data and the ICS device logic and programming. Modbus does not associate data with an information model as other protocols or frameworks do (OPC Foundation, 2020). For instance, the values at coil 50 or register 120 could be implemented entirely differently between two PLCs mounted side-by-side in a control panel. It depends on the developed logic and association between Modbus mapping tables. Therefore, without viewing a project file, PLC program, or HMI screen, limited contextual information is available to an attacker without significant dwell time in the ICS environment to watch and learn. Modbus registers can represent a range of process or control variables. These may include tank level, flow rate, temperature, pressure, voltage, setpoint, or control output. Modbus coils, on the other hand, offer less context and are more difficult to decipher: a value of 0 or 1, for example, could indicate pump status, breaker position, valve position, or can be used for control of those items. Despite the difficulty of gaining process and control system understanding, the 2014 German Steel Mill Cyber Attack illustrated that adversaries learned sufficient details about the environment, leveraged specialized ICS knowledge, and caused multiple control system failures that ultimately led to a plant outage and consequential physical equipment damage (Lee, Assante, & Conway, 2014). The 2015 Ukraine power grid attack is a further example of adversaries learning the environment and leveraging trusted communications to cause an electrical grid outage. The second attack on the Ukraine power grid, which happened in 2016, utilized extensible ICS specific malware that is known as CRASHOVERRIDE. The malware contained an IEC104 protocol module, @ 2021 SANS Institute Author Retains Full Rights
  • 5. © 2 0 2 0 T h e S A N S I n s t i t u t e , A u t h o r R e t a i n s F u l l R i g h t s © 2020 The SANS Institute Author retainsfull rights. Mitigating Vulnerable ICS Protocols 4 Michael Hoffman, mjhoffman80@gmail.com among others, that leveraged capabilities to pull RTU configurations in the ICS environment. The IEC104 module then used this implementation-specific knowledge to manipulate breaker positions, leading to a power outage (Lee R. M., 2017). As Slowik suggests, ICS attacks appear to be increasing both in relative frequency and severity (2019). Therefore, when considering the increasing threat to the ICS environment, it becomes imperative for asset owners and operators to leverage proper device configuration, programming methodologies, and network security barriers to increase the security posture of ICS devices that use insecure protocol communication. 1.3. ICS Security Challenges and Potential Solutions The Stuxnet malware that infected Siemens PLCs to perform centrifuge cascade overpressure and centrifuge rotor speed operational manipulations at the Natanz Fuel Enrichment Plants marked a decisive change in the history of the ICS community (Langer, 2013). Since Stuxnet, ICS owners, operators, and vendors have begun to take notice of their vulnerable systems and incorporate increased security controls. As an example, Rockwell Automation ControlLogix PLCs now can encrypt their programs and lock access to routines (Allen-Bradley, 2018). Additionally, they have included new CIP security enhancements in their communication modules to encrypt EtherNet/IP protocol traffic between PLCs and drives (Rockwell Automation, 2019). For their S7 PLC product line, Siemens has implemented password block protection and three staggered CPU protection levels (Siemens, 2016). Despite these improvements, researchers are still at work uncovering many vulnerabilities in ICS devices. For the year of 2018, Dragos indicated that 17 ICS vulnerability advisories are reported monthly, on average, and of those advisories, 28 percent are related to PLCs and industrial equipment (Dragos, 2018). For the asset owners and operators, however, PLCs and industrial equipment are the same devices used in control systems of physical processes and cannot be easily patched without causing a process disruption. For specific industries and processes, an average span of five to six years is prevalent between maintenance windows where firmware can be upgraded. These devices also are at a functional location in the Purdue Model where the responsibility of work blurs between various staff, including instrumentation technicians, @ 2021 SANS Institute Author Retains Full Rights
  • 6. © 2 0 2 0 T h e S A N S I n s t i t u t e , A u t h o r R e t a i n s F u l l R i g h t s © 2020 The SANS Institute Author retainsfull rights. Mitigating Vulnerable ICS Protocols 5 Michael Hoffman, mjhoffman80@gmail.com electricians, automation engineers, ICS security engineers, and vendors. Therefore, coordination with operations personnel and working closely with technical staff is necessary to perform device-level firmware upgrades. Nevertheless, apart from keeping devices patched, many of these devices are still insecure by design and can be manipulated by an attacker without leveraging any unpatched vulnerability (Langner, 2019). Still, a variety of potential controls and protective measures do exist for these “insecure-by-design” systems. Many vendors offer embedded PLC and RTU security configuration settings. Other potential defenses include properly checking range values in the PLC code itself, which is not unlike conventional standard programming best practices (McConnell, 2004). Additional essential controls include establishing startup or “default” values in the PLC for proper recovery (Shearer, Dely, Conway, & Robinson, 2019). Finally, installing an Application layer ICS firewall to permit only those PLC functions necessary for the intended program, is yet another mitigating control (Bodungen, Singer, Shbeeb, Hilt, & Wilhoit, 2017). Therefore, a holistic effort is needed for ICS device-level security, as shown in Figure 3, starting with applying the latest tested firmware, disabling services unneeded, and enabling security controls already supplied by the vendor. ICS DMZ Perimeter Zone and Device Perimeter Program and Device Security Device Firmware @ 2021 SANS Institute Author Retains Full Rights
  • 7. © 2 0 2 0 T h e S A N S I n s t i t u t e , A u t h o r R e t a i n s F u l l R i g h t s © 2020 The SANS Institute Author retainsfull rights. Mitigating Vulnerable ICS Protocols 6 Michael Hoffman, mjhoffman80@gmail.com Figure 3. Layers ICS device protection The next layer of security is achieved by implementing secure programming practices, such as treating any external data as suspect and ensuring that if devices do fail or are compromised, they can be restarted with necessary default values for safe operation. The final layers of Device, Zone, and Parameter protection provide facilities to tightly restrict communication at ICS protocol level and protect the lower functional networks from those levels above them. This research will demonstrate that it is possible to increase the level of effort required for an attacker to maliciously abuse ICS devices that use insecure protocols through the implementation of configuration, programming, and network security controls. With these potential mitigation solutions reviewed, the remaining sections cover assessments leveraging both the SANS ICS515 and ICS612 course student kits. 2. Research Method The criteria for researching the proposed mitigations was to leverage ICS devices provided to SANS ICS course students, ensure assessments could be repeated by other researchers, and provide techniques that could be tailored and extended to various ICS systems. As shown in figure 2, the components in the ICS VLAN include student PLC kits from SANS ICS515 and ICS612 courses and a MOXA EDR-G903 Modbus Application layer firewall. For the supervisory VLAN, a workstation VM was used for both PLC and CybatiWorks development. Additionally, the ctmodbus tool was utilized from the ControlThingsIO Platform VM to generate Modbus packets in an attempt to overwrite coils and registers in the ICS VLAN (ControlThings I/O, 2020). A separate VM was deployed to run Wireshark to monitor traffic from either the ICS VLAN or between the CLICK PLC and Modbus firewall. A Cisco IE-3010 switch was used to route cross-VLAN communication and was configured to mirror all ICS VLAN traffic coming through the switch out to the Wireshark VM. @ 2021 SANS Institute Author Retains Full Rights
  • 8. © 2 0 2 0 T h e S A N S I n s t i t u t e , A u t h o r R e t a i n s F u l l R i g h t s © 2020 The SANS Institute Author retainsfull rights. Mitigating Vulnerable ICS Protocols 7 Michael Hoffman, mjhoffman80@gmail.com Figure 2. ICS Lab Setup The ICS515 package incorporated a modified version of a traffic light program, used in the course, to simulate a four-way stoplight. The ICS612 CLICK PLC programming was modified to read and write Modbus registers from the ICS515 CybatiWorks Raspberry PI. The updated CLICK PLC program displayed the traffic lights status, the Raspberry system time on the local HMI, and had the capability to control the traffic lights and update the Raspberry system time from the HMI. This configuration is like many PLC-to- PLC communications used in various ICS environments. In this instance, the CybaitWorks Raspberry PI is functioning as a Modbus Slave, and the CLICK PLC is functioning as a Modbus Master with full read/write capability. The first assessment consisted of configuring internal security controls in the CLICK PLC processor for communication session handling to determine if it would be effective against the remote attackers Modbus tool. Although this does test the effectiveness of the @ 2021 SANS Institute Author Retains Full Rights
  • 9. © 2 0 2 0 T h e S A N S I n s t i t u t e , A u t h o r R e t a i n s F u l l R i g h t s © 2020 The SANS Institute Author retainsfull rights. Mitigating Vulnerable ICS Protocols 8 Michael Hoffman, mjhoffman80@gmail.com CLICK PLC security controls, the researcher acknowledges that it likely has limited portability to other PLCs manufactures, such as Rockwell and Siemens, which include different security measures in their products. The second assessment included adding ladder logic code to separate running logic from communication logic. This step encompasses adding input filtering, which is essentially adopting and porting standard computer programing best practices to PLC ladder logic programming (OWASP Top Ten, 2020). Part of this process/step included adding default startup values to the code to bring the PLC back to a safe operational state in the event of a successful attack. The final test added a MOXA secure router in front of the CLICK PLC with a custom configuration to allow only the required Modbus register types and ranges between the two devices. 3. Findings and Discussion Throughout the testing, it was evident that the devices under consideration are designed to operate with known “good” parameters, settings, and communications. During the firewall assessment, the CLICK PLC Modbus master and slave ladder logic blocks froze due to dropped Modbus connectivity and had to be restarted. Likewise, during the same assessment, the REXYGEN Modbus server component in the Raspberry PI froze from multiple dropped sockets and required a service restart to get communications working. Additionally, the CybatiWorks unit experienced an SD card corruption early in the testing. In order to get the Raspberry PI operational, the system was rebuilt using a new Raspbian Linux image and the latest version of the REXYGEN Core package. These issues highlight the importance of assessing ICS systems in a safe lab environment where device failures have a limited impact on the physical environment. The following assessments carried out on the CLICK PLC, programs, CybatiWorks Raspberry PI, and Moxa firewall, take the approach of applying security controls from the inside out. This method consists of starting with device security, then focusing on programming controls, and finally, providing a secure network perimeter. The @ 2021 SANS Institute Author Retains Full Rights
  • 10. © 2 0 2 0 T h e S A N S I n s t i t u t e , A u t h o r R e t a i n s F u l l R i g h t s © 2020 The SANS Institute Author retainsfull rights. Mitigating Vulnerable ICS Protocols 9 Michael Hoffman, mjhoffman80@gmail.com assessments began with updating device firmware to the latest version to ensure the most recent vendor security settings and controls were available for testing. 3.1. PLC Security Controls Assessment The CLICK programming software and PLC firmware version, which are often aligned, was at version 2.40. At the time of assessment, version 2.51 was available and subsequently installed. An upgrade to the PLC firmware followed with a project file upgrade. Upon initial review, the default configuration of the PLC was unprotected and allowed the PLC to be entirely manipulated by anyone with local or remote network access. Program uploads and downloads, operational changes, and data could be all manipulated. After reviewing the security settings, password protection features were enabled for the project file and system configuration. Enabling these settings protects both the PLC program (ladder logic) and CPU (IP address, client/server settings, etc.) from being read or manipulated without a password. As shown in Figure 4, password protection settings for data reads and writes were also enabled to lock down remote Modbus interactions to the PLC acting as a Modbus slave. EtherNet/IP was out of scope for the assessment and disabled in a configuration section, not shown. Figure 4. PLC password security settings With password security enabled, the program was downloaded to the PLC. Initial testing revealed that Modbus read and write functionality could still be performed using the ctmodbus tool. Troubleshooting revealed that for the settings to take effect, the PLC @ 2021 SANS Institute Author Retains Full Rights
  • 11. © 2 0 2 0 T h e S A N S I n s t i t u t e , A u t h o r R e t a i n s F u l l R i g h t s © 2020 The SANS Institute Author retainsfull rights. Mitigating Vulnerable ICS Protocols 10 Michael Hoffman, mjhoffman80@gmail.com needed to be rebooted. After rebooting the PLC, any remote Modbus TCP read requests failed, with the slave device failure error, as shown in Figure 5. It is important to note, however, that if an attacker had access to the same VLAN where ICS is connected, they could perform a layer two attack and capture the password during the initial authentication challenge. Figure 5. Wireshark capture of a Modbus read failure The password security control for data is a global setting --affecting not only Ethernet communication but also serial communication, which is an essential consideration for enabling such a security control. The local HMI, which is part of the ICS612 student kit, is connected to the second port on the CLICK PLC, which is an RS-232C serial port and uses Modbus to read and write values. With the data security setting enabled, the HMI displayed a data access error as it could not read PLC values. Testing further commenced for Modbus writes, and those also failed, as shown in Figure 6. Figure 6. Wireshark capture of a Modbus write failure @ 2021 SANS Institute Author Retains Full Rights
  • 12. © 2 0 2 0 T h e S A N S I n s t i t u t e , A u t h o r R e t a i n s F u l l R i g h t s © 2020 The SANS Institute Author retainsfull rights. Mitigating Vulnerable ICS Protocols 11 Michael Hoffman, mjhoffman80@gmail.com Based on the results above, the device controls effectively worked by limiting Modbus connectivity to an external Modbus master device irrespective of the transport protocol. However, despite Modbus slave isolation, the PLC continued to work correctly as a Modbus master by reading values from the ICS515 CybatiWorks modified traffic light program. After verifying modus slave data password enforcement for reading and writing, the security settings were reverted. As shown in Figure 7, by enabling Modbus reads in the PLC security settings, the ctmodbus tool was able to read the PLC values once again. Figure 7. ctmodbus tool illustrating Modbus reads Figure 8 shows the traffic generated by the ctmodbus tool, which is precisely the same, and further reinforces that Modbus values are transmitted in the clear and can easily be deciphered. @ 2021 SANS Institute Author Retains Full Rights
  • 13. © 2 0 2 0 T h e S A N S I n s t i t u t e , A u t h o r R e t a i n s F u l l R i g h t s © 2020 The SANS Institute Author retainsfull rights. Mitigating Vulnerable ICS Protocols 12 Michael Hoffman, mjhoffman80@gmail.com Figure 8. Modus reads captured by Wireshark Beyond password security controls tested, the CLICK PLC did not offer restricted access on PLC tags themselves, although it did indicate tag access, as shown in Figure 9. Figure 9. CLICK PLC tags showing Read/Write (RW) attributes In contrast, Rockwell PLCs do offer external access attributes to control how external applications interact with the tag, which provides yet another means to restrict external communication at the tag value level (Allen-Bradley, 2018, p. 64). External access settings can be Read/Write, Read-Only, and None, which means that external applications, such as HMI, PLCs, or Historians, would not be able to interact with the tag. @ 2021 SANS Institute Author Retains Full Rights
  • 14. © 2 0 2 0 T h e S A N S I n s t i t u t e , A u t h o r R e t a i n s F u l l R i g h t s © 2020 The SANS Institute Author retainsfull rights. Mitigating Vulnerable ICS Protocols 13 Michael Hoffman, mjhoffman80@gmail.com Similarly, the CybatiWorks REXYGEN application running on the Raspberry PI did have the ability to restrict Modbus access at the tag level, as shown in Figure 10. Figure 10. REXYGEN Modbus Slave configuration with read/write restriction The auto_mode tag controls the traffic light program; toggling the bit will cause the traffic lights to stop or start the cyclic program operation. With the value set to both readable and writable, the ctmodbus tool was able to read the register at the time 16:51:23 with a value of one and then wrote over the register with a zero and subsequently re-read the register with a value of zero at 16:51:49, as shown below in Figure11. Figure 11. ctmodbus tool modifying auto_mode tag on the Raspberry PI By making a configuration change to the auto_mode tag to select only writeable (this is per documentation for a REXYGEN Modbus slave settings and not a typo), the auto_mode value was able to be read but not written. As shown in Figure 12, the Write @ 2021 SANS Institute Author Retains Full Rights
  • 15. © 2 0 2 0 T h e S A N S I n s t i t u t e , A u t h o r R e t a i n s F u l l R i g h t s © 2020 The SANS Institute Author retainsfull rights. Mitigating Vulnerable ICS Protocols 14 Michael Hoffman, mjhoffman80@gmail.com Single Register 2 with a value of 1 did not affect the register value, and the subsequent Read Holding register still showed a value of zero. Figure 12. ctmodbus unable to modify auto_mode tag on the Raspberry PI Therefore, this assessment indicates that the REXYGEN Modbus server can restrict access at the granular tag level. Restricting read and write access to Modbus registers and coils not required for the control implementation reduces the attack surface to the device. Furthermore, it is crucial to restrict access to functionality not required and apply standard security practices such as those given in CIS Control 5 (Center for Internet Security, 2020). If a PLC offers services such as a web portal, FTP host, or SSH host, these services and protocols should be thoroughly scrutinized and disabled if possible, to decrease the attack surface for the respective PLC controller and given control scenario. Once these device-level mitigations are employed, the next step to holistically secure these devices is to evaluate potential PLC program vulnerabilities and review their mitigations. 3.2. PLC Programming Assessment Beyond leveraging security controls that vendors have built into their products, the actual implementation of programs and logic running in PLC devices affect the overall security of their implementation. Despite running legacy protocols with no built-in security, asset owners and operators can leverage programming best practices that have been common in the IT community inside their PLC and RTU programs. Some of these areas include properly defined interfaces between logic and functional blocks. Others @ 2021 SANS Institute Author Retains Full Rights
  • 16. © 2 0 2 0 T h e S A N S I n s t i t u t e , A u t h o r R e t a i n s F u l l R i g h t s © 2020 The SANS Institute Author retainsfull rights. Mitigating Vulnerable ICS Protocols 15 Michael Hoffman, mjhoffman80@gmail.com include data type and range validation. Although these techniques are not a one-to-one mapping between conventional programming and PLC ladder logic/function blocks, many of the constructs do carry over. One specific security construct in computer programming that carries over to PLC programming is the notion of limiting the scope, or access, to variables. In referring to minimizing scope, McConnell states, “…you should declare each variable to be visible to the smallest segment of code that it needs to see it” (Code Complete, 2004, p. 251). Vendors, such as Rockwell, have implemented this security practice by providing the option to configure Tag variable scope. For Rockwell PLCs specifically, tag scope can be set to Controller Level or Program Level, which determines if the tag value can be read and written from within a set of programs running on a PLC. Program scope tags, which have local scope, cannot be used for external communication directly, such as with EtherNet/IP or Modbus TCP, and depend on Controller Scope tags to interact outside of their program (Allen-Bradley, 2018, p. 25). Upon review of the CLICK PLC, tag scope could not be restricted or segmented to various programs, and therefore this feature was not tested as all memory locations are globally accessible. Validating inputs is a critical component in secure computer programming. With regards to PLC ladder logic, function blocks, or structured text, this concept is no different. According to OWASP, “Input validation should happen as early as possible in the data flow, preferably as soon as the data is received from the external party” (OWASP, 2020). For external connectivity, this translates to validating external data from a Modbus TCP connection. As shown in Figure 13, the addresses of DS131 and DS132 are populated directly by external data from the CybatiWorks kit. @ 2021 SANS Institute Author Retains Full Rights
  • 17. © 2 0 2 0 T h e S A N S I n s t i t u t e , A u t h o r R e t a i n s F u l l R i g h t s © 2020 The SANS Institute Author retainsfull rights. Mitigating Vulnerable ICS Protocols 16 Michael Hoffman, mjhoffman80@gmail.com Figure 13. PLC logic with no input testing Because the tags can be written from an external source, the data value of DS131, which is always being overwritten by the Modbus read block, can also be overwritten by an attacker. In this example, a latching “SET” is used to capture the event due to how fast the values are being overwritten from the CybatiWorks data. By leveraging the ctmodbus tool again, the Modbus address of 130 (displayed as 131 in Figure 13) is manipulated by forcing a value from the remote laptop, as shown in Figure 14. Figure 14. ctmodbus tool used to manipulate a register holding year data The Modbus register mapped for the SET instruction at address C90 is 16474, but the actual register area in memory is at 16473, which is most likely due to a one-off implementation difference with the address labels starting at one versus the actual memory addresses starting at 0. After hexadecimal value of 00c8 (200 in decimal) is written to 130 (DS131 in Figure 13), the compare logic sees a difference in values and sets the internal C90 bit to True, which is reflected in the second Read Discrete Inputs @ 2021 SANS Institute Author Retains Full Rights
  • 18. © 2 0 2 0 T h e S A N S I n s t i t u t e , A u t h o r R e t a i n s F u l l R i g h t s © 2020 The SANS Institute Author retainsfull rights. Mitigating Vulnerable ICS Protocols 17 Michael Hoffman, mjhoffman80@gmail.com request return value of 1, and is further illustrated in Figure 15 with SET output highlighted in blue. Figure 15. PLC program manipulation due to an external overwrite A possible mitigation for this attack is to provide input range checking for the values. If a malicious individual or program exploits a vulnerable protocol, the values passed by the input validation will at least be in the range that the PLC program is designed to handle. As shown in Figure 16, the CybatiWorks hour value is read into register DS134 and verified to ensure the value is greater than or equal to 0 and less than or equal to 24. If the value falls between these ranges, it is copied over to a separate register (DS87 in this case) for use in the PLC logic. Figure 16. PLC inputs with range checking As shown in Figure 17, the range validation assessment is carried out by first reading the value of DS87, which is input register 86. Upon the first read request, the register provides a value of Hex of 13, or Decimal 19. @ 2021 SANS Institute Author Retains Full Rights
  • 19. © 2 0 2 0 T h e S A N S I n s t i t u t e , A u t h o r R e t a i n s F u l l R i g h t s © 2020 The SANS Institute Author retainsfull rights. Mitigating Vulnerable ICS Protocols 18 Michael Hoffman, mjhoffman80@gmail.com Figure 17. Testing input validation against external overwrite Register 133, which is DS134, is then overwritten by a value of Decimal 25, or Hex 19, and then DS87 is re-read to verify that the value is not changed, thus proving that the input validation logic is working. Despite still having the ability to overwrite a value within the input range validation area remotely, the program logic will be able to handle an input over-range or under-range condition, thereby avoiding a logic error or PLC Processor fault. Another essential reason to separate inputs from logic is to provide a snapshot of the values for orderly program flow and execution. PLCs have historically operated in a synchronous, cyclic fashion where inputs are read, logic solved, and outputs are written. Nevertheless, many newer PLCs can communicate asynchronously between input, communication, and output modules during program execution. This topic is referred to as buffering I/O data, and as Scott describes, “…input and output values can change in the middle of a program scan and [can] put the program in an unpredictable state (2015, p. 77).” Therefore, it is crucial to take a snapshot of all values used for program logic to ensure they remain unchanged, and then validate inputs before using them in PLC logic, as Figure 18 illustrates. @ 2021 SANS Institute Author Retains Full Rights
  • 20. © 2 0 2 0 T h e S A N S I n s t i t u t e , A u t h o r R e t a i n s F u l l R i g h t s © 2020 The SANS Institute Author retainsfull rights. Mitigating Vulnerable ICS Protocols 19 Michael Hoffman, mjhoffman80@gmail.com Figure 18. Example PLC Cycle with added buffering and validation Despite the effort to buffer input data and validate range, an attacker could still overwrite values using insecure ICS protocols within the acceptable analog value range or with coils where range validation would still accept a 0 or 1. If an ICS cyber event were to occur, it could cause a PLC logic error, CPU fault, or, worse yet, affect the physical process under control. Therefore, a recovery function is necessary to restore operations after a cybersecurity event (NIST, 2018). As discussed by Shearer, Dely, Conway, and Robinson, the specific recovery, in this case, is to provide an initialization routine that injects safe startup values for the respective logic and process (2019). One method to carry out this feature is to leverage a first scan bit, which is energized only upon the first PLC scan cycle, as shown in Figure 19. Figure 19. PLC First Scan Bit used to call the INITIALIZE subroutine Depending on the PLC manufacture, the first scan bit can be set using the programming software or a local mode switch on the PLC processor. The CLICK PLC provides a RUN/STOP switch to change PLC modes. However, cycling power to the processor will Read Inputs Buffer I/O Input Validation Execute Logic Write Outputs Comms, Status @ 2021 SANS Institute Author Retains Full Rights
  • 21. © 2 0 2 0 T h e S A N S I n s t i t u t e , A u t h o r R e t a i n s F u l l R i g h t s © 2020 The SANS Institute Author retainsfull rights. Mitigating Vulnerable ICS Protocols 20 Michael Hoffman, mjhoffman80@gmail.com always cause the first scan bit to transition from false to true (0 to 1, respectively) for one cycle. Because the Main Program is continuously executed, utilizing a first scan bit to trigger the initialization subroutine is an effective way to compartmentalize code and ensure the subroutine is only executed once. As shown in Figure 20, the initialization subroutine both resets and sets latching outputs. Figure 20. INITIALIZE subroutine example In PLCs, a latching output is held in a true or false condition for an indefinite period until a logical condition causes a state change. In this example, the initialization subroutine is also leveraged to move constant integer values into memory locations for range checking or other critical program functions. These pre-engineered values injected from the initialization program ensures safe process startup conditions. Although the discussed programming practices are necessary for secure program design and implementation, they do nothing to protect the ICS device perimeter from malicious abuse of ICS protocols or specially crafted packets. Therefore, an ICS-specific Application layer firewall is the next logical mitigation step to protect ICS devices using vulnerable communication protocols. 3.3. ICS Application Layer Firewall Assessment Firewalls are border protection devices and control communication between different levels of trust (CISA, 2020). In the ICS space, firewalls are commonly used to define the boundary between the corporate network and ICS network, create the ICS DMZ, and further segregate levels of trust deeper in the control network (NIST, 2015, pp. @ 2021 SANS Institute Author Retains Full Rights
  • 22. © 2 0 2 0 T h e S A N S I n s t i t u t e , A u t h o r R e t a i n s F u l l R i g h t s © 2020 The SANS Institute Author retainsfull rights. Mitigating Vulnerable ICS Protocols 21 Michael Hoffman, mjhoffman80@gmail.com 5-12). Firewalls inspect and control traffic at different layers of the TCP/IP stack, and thus can have varying degrees of granularity in their applicability. Packet filtering firewalls are stateless and inspect at the Internet layer for source and destination IP addresses. Session-based firewalls maintain a session table and inspect/control communication at the Transport layer where TCP and UDP protocols are found, which includes the session, port number/protocol, and flags -- among other information. At the Application layer, a firewall inspects and controls the actual application communication. Modbus TCP commands, for example, are found in the Application layer. Therefore, to provide granular inspection and control for Modbus TCP communication, an Application layer firewall is required. The level of trust is reduced as communication extends beyond the boundary of an ICS device. The amount of risk involved in this reduction of trust is mostly dependent on the security and medium of the communication protocol but is also dependent on the controlled physical process. If a PLC or RTU is used for read-only monitoring of a natural gas well, for example, the risk of compromise is less than it would be for a PLC or RTU that controls well pressure or flow rate. To mitigate the risk of ICS systems that are controlling critical processes, and yet are still using legacy protocols, an ICS Application layer firewall can be used to allow only required commands per the control application. To understand and assess how Modbus can be restricted, a Moxa EDR-G903 model secure router was leveraged. Initially, the device was loaded with firmware version 5.0. Upon checking with the vendor's website, version 5.4 was available and subsequently installed. To restrict communication to the CLICK PLC specifically, the Moxa was placed in front of the PLC using the LAN port on the device and was set to bridge mode, also called transparent mode, which makes it appear like a switch on the network. The Moxa WAN1 port was connected to the upstream Cisco switch with WAN2 port disconnected. Application layer firewall functionality in the Moxa comes with the capability to inspect the Modbus commands and registers themselves. The device can support Layer 2 Policy, Layer 3 Policy, and a Modbus Policy. The firewall assessment began by configuring Layer 3 rules to allow unobstructed Modbus communication and @ 2021 SANS Institute Author Retains Full Rights
  • 23. © 2 0 2 0 T h e S A N S I n s t i t u t e , A u t h o r R e t a i n s F u l l R i g h t s © 2020 The SANS Institute Author retainsfull rights. Mitigating Vulnerable ICS Protocols 22 Michael Hoffman, mjhoffman80@gmail.com enable programming software from the ICS612 VM to communicate with the CLICK PLC, as shown in Figure 21. Figure 21. Initial settings applied to the Moxa firewall As expected, the ctmodbus tool reveals that read/write functionality from an external network is possible. Figure 22 shows a successful Read Input Register at memory location 103, which returns a value of 07e4 hex value (2020 decimal). The value of 2019 (07e3 hex) is written back to the register, and then the value is re-read as 07e3, which indicates the value was changed. Figure 22. External register manipulation The next assessment was to tighten up the connection setting and only allow port 502 connectivity between the CLICK PLC at 172.16.11.22 and CybatiWorks PI kit at 172.16.11.13 address, as shown in Figure 23. @ 2021 SANS Institute Author Retains Full Rights
  • 24. © 2 0 2 0 T h e S A N S I n s t i t u t e , A u t h o r R e t a i n s F u l l R i g h t s © 2020 The SANS Institute Author retainsfull rights. Mitigating Vulnerable ICS Protocols 23 Michael Hoffman, mjhoffman80@gmail.com Figure 23. Additional settings applied for Layer 3 firewall configuration With firewall source/destination physical ports and source/destination IP addresses assigned on rule 1, the connectivity was no longer able to be established from the ctmodbus application. This is illustrated by Wireshark capturing TCP SYN packets sent from the ControlThingsIO VM at 172.16.6.52 to the PLC at 172.16.11.22, but there was no connection established as shown in Figure 24. Figure 24. Failed TCP session creation due to tightening firewall rules. Although a Man In The Middle (MITM) attack on Modbus TCP, as discussed by Sanche, could still be leveraged with this connection, the placement of the remote laptop is outside of the ICS VLAN (2017). Therefore, a MITM attack will not natively work. If an attacker was able to pivot down to a functional level 1 zone or abuse a trusted connection between a Modbus master station and slave, additional firewall restrictions would be required to protect the ICS device endpoint(s). Applying additional protections for Modbus TCP is performed at the Application layer. However, before creating a firewall ruleset, the underlying function codes and ranges for the given ICS devices must be understood. For Modbus TCP, this information is typically found by reviewing Modbus master pulling configuration, and Modbus slave mapping tables. For the systems under assessment, this information was found by @ 2021 SANS Institute Author Retains Full Rights
  • 25. © 2 0 2 0 T h e S A N S I n s t i t u t e , A u t h o r R e t a i n s F u l l R i g h t s © 2020 The SANS Institute Author retainsfull rights. Mitigating Vulnerable ICS Protocols 24 Michael Hoffman, mjhoffman80@gmail.com reviewing the modified CybatiWorks Modbus mapping table, as shown in Figure 25. Figure 25. CybatiWorks REXYGEN modified Modbus configuration Mapping tables are used in ICS devices as a bridge between Modbus register or coil addresses and underlying logic or programs. To incorporate the principle of least privilege in the Moxa firewall ruleset, the CybatiWorks Modbus write and read register ranges of 0-10 and 20-36, respectively, are mirrored. The resulting firewall rules configured in the Moxa are shown in Figure 26. CybatiWorks Control Area The CLICK PLC writes to these Registers CybatiWorks Status Area The CLICK PLC reads these Registers @ 2021 SANS Institute Author Retains Full Rights
  • 26. © 2 0 2 0 T h e S A N S I n s t i t u t e , A u t h o r R e t a i n s F u l l R i g h t s © 2020 The SANS Institute Author retainsfull rights. Mitigating Vulnerable ICS Protocols 25 Michael Hoffman, mjhoffman80@gmail.com Figure 26. Moxa Firewall configuration Modbus specific registers A unique requirement for the Moxa Modbus Application Layer rules is that a response from the slave device must be explicitly listed on a reverse rule -- despite having an underlying established TCP session. The first rule at Index 1 is for a Read Holding Register request from the CLICK PLC at 172.16.11.22 with an address range of 20-36. The slave response is listed at Index 2, with the traffic direction reversed but using the same function code. For Modbus writes, Index 3 allows function code 16, or Write Multiple Registers, with an address range of 0-10. This rule matches both the CybatiWorks Modbus configuration and the Click PLC Modbus write Configuration, shown in Figure 27. Due to the one-off addressing of the PLC, write register addressing starts at 400001 with 11 master addresses. This translates to a range of 0-10, or 11 addresses starting at address 0. The same reverse rule requirement holds for Modbus writes, and is the purpose for the rule at Index 4. @ 2021 SANS Institute Author Retains Full Rights
  • 27. © 2 0 2 0 T h e S A N S I n s t i t u t e , A u t h o r R e t a i n s F u l l R i g h t s © 2020 The SANS Institute Author retainsfull rights. Mitigating Vulnerable ICS Protocols 26 Michael Hoffman, mjhoffman80@gmail.com Figure 27. Click PLC Modbus Write block configuration An important area to note is that the firewall rule(s) must incorporate the entire range of coils or registers requested or written. If a Modbus firewall inspection rule range is shorter than the Modbus function range requested by the master, the firewall will drop the entire packet. This is illustrated by increasing the number of master address from 17 to 18, as shown in Figure 28. Figure 28. Click PLC Modbus Write block configuration @ 2021 SANS Institute Author Retains Full Rights
  • 28. © 2 0 2 0 T h e S A N S I n s t i t u t e , A u t h o r R e t a i n s F u l l R i g h t s © 2020 The SANS Institute Author retainsfull rights. Mitigating Vulnerable ICS Protocols 27 Michael Hoffman, mjhoffman80@gmail.com Before this assessment, however, the Wireshark connection was moved to the network tap between the CLICK PLC and Moxa firewall to capture the firewall response to the modified Modbus request values. As shown in Figure 29, when the request word count was changed from 17 to 18 in the PLC configuration, the Moxa firewall detects this change and closes the connection to the CybatiWorks PI. The closed connection was also immediately evident on the PLC HMI as the traffic light screen stopped updating. Figure 29. TCP session termination from word count change. This assessment shows that by leveraging ICS protocol aware application layer firewalls and configuring granular rule sets, the control of insecure ICS protocol device communication and, therefore, the security of ICS devices themselves is significantly increased. However, increased security is only fully realized when a proper reference architecture, such as the Purdue Model, is implemented, that provides layers of security controls to protect these critical devices from systems and communication above the control network and beyond the ICS. @ 2021 SANS Institute Author Retains Full Rights
  • 29. © 2 0 2 0 T h e S A N S I n s t i t u t e , A u t h o r R e t a i n s F u l l R i g h t s © 2020 The SANS Institute Author retainsfull rights. Mitigating Vulnerable ICS Protocols 28 Michael Hoffman, mjhoffman80@gmail.com 4. Recommendations and Implications The mitigating controls discussed in this paper are focused on preventative and, in some small way, recovery controls to deal with the prevalent use of insecure ICS protocols in lower functional levels of the Purdue Model. A commonly heard motto in the security community says, “prevention is ideal, but detection is a must.” However, detection builds on the foundation of prevention. Therefore, architectural and passive defenses, including device hardening, patching/updating firmware, implementing secure logic and programs, employing network and zone segmentation, among others, provide a higher value of return and lay the foundation for detection capabilities and ultimately Active Defense (2018). Lee describes, “..Active Defense is more achievable and efficient when done in an environment with proper Architecture and Passive Defenses (2015, p. 4).” With preventative and architectural controls designed and adequately maintained, defenders can then leverage tools such as Network Security Monitoring (NSM) to detect adversarial behaviors in ICS networks and respond to attempted attacks. 4.1. Recommendations for Practice Many of the mitigation controls discussed can be performed on operational environments, but there is always risk involved with making any changes to PLCs, RTUs, or other ICS devices. Additionally, making network changes can disrupt communication that could cause loss of view or control. Therefore, the most opportune time to make ICS devices or network modifications is during planned operational outages with scheduled maintenance windows. However, this does not prevent a thorough assessment of the asset owner's and operator's ICS devices and systems to understand their security posture and threat landscape and begin to plan and take necessary mitigating actions. For new installations or upgrades, ICS devices should be implemented with vendors recommended security practices for hardening, programming, and network restrictions. Finally, if devices have the option of using a more secure protocol, it should be reviewed to determine applicability for the environment and used if possible. @ 2021 SANS Institute Author Retains Full Rights
  • 30. © 2 0 2 0 T h e S A N S I n s t i t u t e , A u t h o r R e t a i n s F u l l R i g h t s © 2020 The SANS Institute Author retainsfull rights. Mitigating Vulnerable ICS Protocols 29 Michael Hoffman, mjhoffman80@gmail.com 4.2. Implications for Future Research The ICS security community would benefit from researching device security settings and controls, programming and logic, and network perimeter security -- each in more detail to further understand vulnerability and mitigations and feed those learnings back to the community. Additionally, this research reviewed only one PLC vendor, and thus, a further refined study could be carried out for other vendors as well. Finally, although Modbus TCP is widely used and easy to assess, other protocols, such as EtherNet/IP or DNP3, would be good candidates to review and contrast with their secure versions. 5. Conclusion Despite the increasing trend of attacks on ICS systems, vulnerable ICS protocols are still in use and are even leveraged in new ICS projects. However, ICS owners and operators do have options to mitigate vulnerabilities inherent in these insecure protocols. Research performed on ICS device security settings, secure programming practices, and deploying network security barriers using student kits from SANS ICS515 and ICS612 courses show that it is possible to increase the security posture of ICS devices and their respective Modbus TCP communications. Although these are preventative mitigations, they enable a strong foundation to build a defensible approach in ICS environments that directly impacts the controlled process. Deploying these mitigations is ultimately dependent on the level of risk in a respective ICS environment. However, asset owners and operators are encouraged to assess their environment to understand the state of ICS devices, protocols, and communication flows and carry out any remediation activities to ensure critical infrastructure is kept operational today and into the future in light of the increasing cyber threats to ICS. @ 2021 SANS Institute Author Retains Full Rights
  • 31. © 2 0 2 0 T h e S A N S I n s t i t u t e , A u t h o r R e t a i n s F u l l R i g h t s © 2020 The SANS Institute Author retainsfull rights. Mitigating Vulnerable ICS Protocols 30 Michael Hoffman, mjhoffman80@gmail.com 6. Appendices The supporting device configurations used throughout this research are posted in GitHub and can be found at the following link: https://github.com/Eirene77/ICSProtocolLab @ 2021 SANS Institute Author Retains Full Rights
  • 32. © 2 0 2 0 T h e S A N S I n s t i t u t e , A u t h o r R e t a i n s F u l l R i g h t s © 2020 The SANS Institute Author retainsfull rights. Mitigating Vulnerable ICS Protocols 31 Michael Hoffman, mjhoffman80@gmail.com References Allen-Bradley. (2018, February). Documents. Retrieved from Rockwell Automation: https://literature.rockwellautomation.com/idc/groups/literature/documents/pm/175 6-pm004_-en-p.pdf Allen-Bradley. (2018, November). Literature. Retrieved from Rockwell Automation: https://literature.rockwellautomation.com/idc/groups/literature/documents/pm/175 6-pm016_-en-p.pdf Assante, M. J., & Lee, R. M. (2015, October). Reading Room. Retrieved from SANS: https://www.sans.org/reading-room/whitepapers/ICS/industrial-control-system- cyber-kill-chain-36297 Bodungen, C. E., Singer, B. L., Shbeeb, A., Hilt, S., & Wilhoit, K. (2017). Hacking Expose, Industrial Control Systems: ICS and SCADA Security Secrets & Solutions. New York: McGraw Hill Education. Center for Internet Security. (2020, January 4). Secure Configuration for Hardware and Software on Mobile Devices, Laptops, Workstations and Servers. Retrieved from Center for Internet Security: https://www.cisecurity.org/controls/secure- configuration-for-hardware-and-software-on-mobile-devices-laptops- workstations-and-servers/ CISA. (2020, January 11). Control System Firewall. Retrieved from US-CERT: https://www.us-cert.gov/ics/Control_System_Firewall-Definition.html ControlThings I/O. (2020, January 2). Tools. Retrieved from ControlThings.io: https://www.controlthings.io/tools CSIA. (2016, September). Improving Industrial Control System Cybersecurity with Defense-in-Depth Strategies. Retrieved from US-CERT: https://www.us- cert.gov/sites/default/files/recommended_practices/NCCIC_ICS- CERT_Defense_in_Depth_2016_S508C.pdf Dragos. (2018). Year In Review 2018. Retrieved from Dragos: https://dragos.com/wp- content/uploads/yir-ics-vulnerabilities-2018.pdf Draias, Z., Serhrouchni, A., & Vogel, O. (2015, July). Taxonomy-of-attacks-on- Industrial-control-protocols. Retrieved from Research Gate: ttps://www.researchgate.net/profile/Zakarya_Drias2/publication/283045654_Taxo @ 2021 SANS Institute Author Retains Full Rights
  • 33. © 2 0 2 0 T h e S A N S I n s t i t u t e , A u t h o r R e t a i n s F u l l R i g h t s © 2020 The SANS Institute Author retainsfull rights. Mitigating Vulnerable ICS Protocols 32 Michael Hoffman, mjhoffman80@gmail.com nomy_of_attacks_on_Industrial_control_protocols/links/568b808108ae1e63f1fce 049/Taxonomy-of-attacks-on-Industrial-control-protocols.pdf Langer, R. (2013, November). Resources. Retrieved from Langner: https://www.langner.com/wp-content/uploads/2017/03/to-kill-a-centrifuge.pdf Langner. (2019, February 12). THE FIVE THINGS YOU NEED TO KNOW ABOUT OT/ICS VULNERABILITY AND PATCH MANAGEMENT. Retrieved from Langner: https://www.langner.com/2019/02/the-five-things-you-need-to-know- about-ot-ics-vulnerability-and-patch-management/ Lee, R. M. (2015, September 1). The Sliding Scale of Cyber Security. Retrieved from SANS: https://www.sans.org/reading-room/whitepapers/ActiveDefense/sliding- scale-cyber-security-36240 Lee, R. M. (2017). White Papers. Retrieved from Dragos: https://dragos.com/wp- content/uploads/CrashOverride-01.pdf Lee, R. M. (2018). ICS515 | ICS Active Defense and Incident Response. Bethesda: SANS Institute. Lee, R. M., Assante, M. J., & Conway, T. (2014, December 30). Industrial Control Systems Library. Retrieved from SANS: https://ics.sans.org/media/ICS-CPPE- case-Study-2-German-Steelworks_Facility.pdf McConnell, S. (2004). Code Complete. Redmond: Microsoft Press. Mostia, W. L. (2019, January 4). Introduction to Modbus. Retrieved from Control Global: https://www.controlglobal.com/articles/2019/introduction-to-modbus/ NIST. (2015, May). Guide to Industrial Control Systems (ICS) Security. Retrieved from NIST: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800- 82r2.pdf NIST. (2018, April 16). Cybersecurity Framework. Retrieved from NIST: https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf OPC Foundation. (2020, January 4). OPC UA Information Models. Retrieved from OPC Foundations: https://opcfoundation.org/developer-tools/specifications-opc-ua- information-models @ 2021 SANS Institute Author Retains Full Rights
  • 34. © 2 0 2 0 T h e S A N S I n s t i t u t e , A u t h o r R e t a i n s F u l l R i g h t s © 2020 The SANS Institute Author retainsfull rights. Mitigating Vulnerable ICS Protocols 33 Michael Hoffman, mjhoffman80@gmail.com OWASP. (2020, January 6). Input Validation Cheat Sheet. Retrieved from OWASP: https://cheatsheetseries.owasp.org/cheatsheets/Input_Validation_Cheat_Sheet.htm l OWASP Top Ten. (2020). Top 10 Web Application Security Risks. Retrieved from OWASP: https://owasp.org/www-project-top-ten/ Rinaldi, J. S. (n.d.). Modbus. Retrieved from Real Time Automation: https://www.rtautomation.com/technologies/modbus/ Rockwell Automation. (2019, July 22). Press Release Details. Retrieved from Rockwell Automation: https://ir.rockwellautomation.com/press-releases/press-releases- details/2019/New-Communication-Module-With-CIP-Security-Can-Reduce- Risks-Boost-Performance-/default.aspx Sanchez, G. (2017, October 20). Man-In-The-Middle Attack Against Modbus TCP Illustrated with Wireshark. Retrieved from SANS Reading Room: https://www.sans.org/reading-room/whitepapers/ICS/man-in-the-middle-attack- modbus-tcp-illustrated-wireshark-38095 Scott, A. (2015). Learning RSLogix 5000 Programming. Birmingham, UK: Packt Publishing. Shearer, J., Dely, J., Conway, T., & Robinson, C. (2019). ICS612 | ICS Cyber Security In-Depth. Bethesda: SANS Institute. Siemens. (2016, March 20). Product Support. Retrieved from Siemens: https://cache.industry.siemens.com/dl/files/010/90885010/att_959937/v1/7743184 6_Security_SIMATIC_DOKU_V20_en.pdf Slowik, J. (2019). Whitepapers. Retrieved from Dragos: https://dragos.com/wp- content/uploads/Evolution-of-ICS-Attacks-and-the-Prospects-for-Future- Disruptive-Events-Joseph-Slowik-1.pdf @ 2021 SANS Institute Author Retains Full Rights