From the course: Ethical Hacking: Hacking IoT Devices

Unlock the full course today

Join today to access over 24,900 courses taught by industry experts.

Searching for OT vulnerabilities

Searching for OT vulnerabilities

- [Instructor] Testing for vulnerabilities and hidden back doors in an operational technology system is essential to prevent attacks. In this segment, we'll cover specific tools, techniques, and procedures used when scanning an operational technology environment. Operational technology and industrial control systems are comprised of physical devices and control systems that are vital for critical processes, making them attractive targets for cyber attacks. Vulnerabilities can exist in various sources and can pose risk to the safety, efficiency and functionality of these systems. Vulnerabilities include, unpatched software, weak access controls, insecure interfaces, and human error. Scanning operational technology systems generally require specialized tools and techniques due to the unique nature of these environments. So let's talk about some of the tools and techniques used in these systems. One technique used to see if there are any misconfigurations is fuzzing the system. A fuzz…

Contents