Lorem ipsum dolor sit amet, consectetur adipisicing elit sed do eiusmod tempor incididunt ut labore et dolore magna.
THREATS, TACTICS AND PROCEDURES TTP
MITRE’S ATT&CK®
ICS/SCADA Pen Test
Initial Access to ICS/SCADA
1. Data Historian Compromise.
2. Drive-by Compromise.
3. Engineering Workstation Compromise.
4. Exploit Public-Facing Application.
5. External Remote Services.
6. Internet Accessible Devices.
7. Replication Through Removable Media.
8. Spear-Phishing Attachment.
9. Supply Chain Compromise.
10. Wireless Compromise.
2. Drive-by Compromise.
3. Engineering Workstation Compromise.
4. Exploit Public-Facing Application.
5. External Remote Services.
6. Internet Accessible Devices.
7. Replication Through Removable Media.
8. Spear-Phishing Attachment.
9. Supply Chain Compromise.
10. Wireless Compromise.
Collection – ICS/SCADA
1. Automated Collection.
2. Data from Information Repositories.
3. Detect Operating Mode.
4. Detect Program Mode.
5. I/O Image.
6. Location Identification.
7. Monitor Process State.
8. Point and Tag Identification.
9. Program Upload.
10. Role Identification.
11. Screen Capture.
2. Data from Information Repositories.
3. Detect Operating Mode.
4. Detect Program Mode.
5. I/O Image.
6. Location Identification.
7. Monitor Process State.
8. Point and Tag Identification.
9. Program Upload.
10. Role Identification.
11. Screen Capture.
Inhibit Response Function – ICS/SCADA
1. Activate Firmware Update Mode.
2. Alarm Suppression.
3. Block Command Message.
4. Block Reporting Message.
5. Block Serial COM.
6. Data Destruction.
7. Denial of Service.
8. Device Restart or Shutdown.
9. Manipulate I/O Image.
10. Modify Alarm Settings.
11. Modify Control Logic.
12. Program Download.
13. Rootkit.
14. System Firmware.
15. Utilise/Change Operating Mode.
2. Alarm Suppression.
3. Block Command Message.
4. Block Reporting Message.
5. Block Serial COM.
6. Data Destruction.
7. Denial of Service.
8. Device Restart or Shutdown.
9. Manipulate I/O Image.
10. Modify Alarm Settings.
11. Modify Control Logic.
12. Program Download.
13. Rootkit.
14. System Firmware.
15. Utilise/Change Operating Mode.