O'Reilly logo

Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions by Stephen Hilt, Kyle Wilhoit, Aaron Shbeeb, Bryan Singer, Clint Bodungen

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 5

HACKING ICS PROTOCOLS

Industrial protocols have evolved over time, from simplistic networks that collect information from remote devices, to complicated networks of systems that have redundancy built into the devices. Protocols that are utilized inside of industrial control systems are sometimes very specific to the application that is being utilized. Over the years many efforts have been made to standardize protocols from standards organizations such as IEC, ISO, ANSI, and others. There is an abundance of proprietary protocols as well. These protocols are built by the vendors, in most cases, to require specific software and hardware to create a vendor-centric system. Regardless of the origin of the protocol, most industrial protocols ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required