CHAPTER 5

HACKING ICS PROTOCOLS

Industrial protocols have evolved over time, from simplistic networks that collect information from remote devices, to complicated networks of systems that have redundancy built into the devices. Protocols that are utilized inside of industrial control systems are sometimes very specific to the application that is being utilized. Over the years many efforts have been made to standardize protocols from standards organizations such as IEC, ISO, ANSI, and others. There is an abundance of proprietary protocols as well. These protocols are built by the vendors, in most cases, to require specific software and hardware to create a vendor-centric system. Regardless of the origin of the protocol, most industrial protocols ...

Get Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.