It’s 3:30 AM: bathed in the pale glow of a computer monitor and the flickering green lights of the nearest network switch, the hacker sits at a keyboard, researching his next victim. The soft clicks of deft hands on a keyboard and the cooling fans of overloaded computer equipment are the only sounds, a false representation of the destruction that awaits. We join our plucky anti-hero in the middle of an around-the-world, multiday, caffeine-fueled hacking bender. Several major oil and gas facilities lay in his digital trail of destruction.
A few taps into his favorite search engine, and he finds his next target: an oil drilling rig in the Gulf of Mexico. Two Nmap scans later, ...
Get Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.