December 2017
Intermediate to advanced
860 pages
16h 1m
English
Let's understand the basics of exploiting SCADA systems. SCADA systems can be compromised using a variety of exploits in Metasploit, which were added recently to the framework. In addition, some of the SCADA servers that are located might have a default username and password, which rarely exist these days, but still there may be a possibility.
Let's try finding some SCADA servers. We can achieve this using an excellent resource, such as http://www.shodanhq.com:
Read now
Unlock full access