CHAPTER 5

HACKING ICS PROTOCOLS

Industrial protocols have evolved over time, from simplistic networks that collect information from remote devices, to complicated networks of systems that have redundancy built into the devices. Protocols that are utilized inside of industrial control systems are sometimes very specific to the application that is being utilized. Over the years many efforts have been made to standardize protocols from standards organizations such as IEC, ISO, ANSI, and others. There is an abundance of proprietary protocols as well. These protocols are built by the vendors, in most cases, to require specific software and hardware to create a vendor-centric system. Regardless of the origin of the protocol, most industrial protocols ...

Get Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.