This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

File:SCADA detection cheat sheet - v.1.0.xlsx

From OWASP
Revision as of 21:11, 8 March 2013 by Andrey Komarov (talk | contribs) (The signatures for the most popular SCADA/RTU/PLC products of famous vendors. It covers several methods of detection through the application level protocols such as HTTP, FTP, SSH. The aim of the cheet sheet is to gather information about the criteria use)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search
SCADA_detection_cheat_sheet_-_v.1.0.xlsx(file size: 37 KB, MIME type: application/vnd.openxmlformats-officedocument.spreadsheetml.sheet)
Warning: This file type may contain malicious code. By executing it, your system may be compromised.

The signatures for the most popular SCADA/RTU/PLC products of famous vendors. It covers several methods of detection through the application level protocols such as HTTP, FTP, SSH. The aim of the cheet sheet is to gather information about the criteria useful for external reconnaissance stage from the hacker side. Additionally, this information will be used for the SCADA Honeypot developing within the project. The file will be regularly updated, feel free to send own signatures and methods of detection.

File history

Click on a date/time to view the file as it appeared at that time.

Date/TimeDimensionsUserComment
current21:11, 8 March 2013 (37 KB)Andrey Komarov (talk | contribs)The signatures for the most popular SCADA/RTU/PLC products of famous vendors. It covers several methods of detection through the application level protocols such as HTTP, FTP, SSH. The aim of the cheet sheet is to gather information about the criteria use
  • You cannot overwrite this file.

There are no pages that link to this file.