It’s 3:30 AM: bathed in the pale glow of a computer monitor and the flickering green lights of the nearest network switch, the hacker sits at a keyboard, researching his next victim. The soft clicks of deft hands on a keyboard and the cooling fans of overloaded computer equipment are the only sounds, a false representation of the destruction that awaits. We join our plucky anti-hero in the middle of an around-the-world, multiday, caffeine-fueled hacking bender. Several major oil and gas facilities lay in his digital trail of destruction.

A few taps into his favorite search engine, and he finds his next target: an oil drilling rig in the Gulf of Mexico. Two Nmap scans later, ...

Get Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.