Designing an ICS Attack Platform

Designing an ICS Attack Platform

The vulnerabilities of ICS networks have been well-discussed. Still, most of the discussion has been focused on the damage to specific devices (as seen in the coverage of the Aurora demonstration, or in some PLC vendors’ public exploit demonstrations). In fact, ICS...