File:SCADA detection cheat sheet - v.1.0.xlsx
From OWASP
Revision as of 21:11, 8 March 2013 by Andrey Komarov (talk | contribs) (The signatures for the most popular SCADA/RTU/PLC products of famous vendors. It covers several methods of detection through the application level protocols such as HTTP, FTP, SSH. The aim of the cheet sheet is to gather information about the criteria use)
SCADA_detection_cheat_sheet_-_v.1.0.xlsx (file size: 37 KB, MIME type: application/vnd.openxmlformats-officedocument.spreadsheetml.sheet)
Warning: This file type may contain malicious code.
By executing it, your system may be compromised.
The signatures for the most popular SCADA/RTU/PLC products of famous vendors. It covers several methods of detection through the application level protocols such as HTTP, FTP, SSH. The aim of the cheet sheet is to gather information about the criteria useful for external reconnaissance stage from the hacker side. Additionally, this information will be used for the SCADA Honeypot developing within the project. The file will be regularly updated, feel free to send own signatures and methods of detection.
File history
Click on a date/time to view the file as it appeared at that time.
| Date/Time | Dimensions | User | Comment | |
|---|---|---|---|---|
| current | 21:11, 8 March 2013 | (37 KB) | Andrey Komarov (talk | contribs) | The signatures for the most popular SCADA/RTU/PLC products of famous vendors. It covers several methods of detection through the application level protocols such as HTTP, FTP, SSH. The aim of the cheet sheet is to gather information about the criteria use |
- You cannot overwrite this file.
File usage
There are no pages that link to this file.