Detecting OT Devices Across Protocol Gateways
This talk demonstrates techniques for identifying and enumerating Operational Technology (OT) devices by leveraging protocol-specific discovery commands across various protocol gateways. It highlights how the convergence of IT and OT networks, combined with the lack of authentication in legacy industrial protocols like Modbus and DNP3, exposes critical infrastructure to remote discovery and potential exploitation. The speaker provides practical guidance on using protocol-specific commands, such as Modbus's 'Report Device Identity' and EtherNet/IP's 'List Identity', to map hidden OT assets behind gateways.
Mapping Industrial Networks: Exploiting Protocol Gateways for Asset Discovery
TLDR: Many industrial control systems are now exposed to the public internet due to IT/OT convergence, creating massive, unauthenticated attack surfaces. By abusing protocol-specific discovery commands like Modbus "Report Device Identity" and EtherNet/IP "List Identity," researchers can map entire hidden networks behind gateways. Pentesters should prioritize these discovery techniques to identify critical infrastructure assets that lack basic authentication.
Operational technology is no longer confined to air-gapped, physically secured facilities. The industry has spent the last decade forcing IT and OT networks together, often with little regard for the security implications of connecting legacy industrial hardware to the public internet. This convergence has turned once-isolated PLCs and sensors into internet-facing assets, and the results are as predictable as they are dangerous. Thousands of these devices are currently reachable from the public internet, and most of them were never designed to handle the scrutiny of a modern network environment.
The Mechanics of Protocol Gateway Abuse
Industrial protocols like Modbus and DNP3 were built in an era where the only threat model was a disgruntled employee with a screwdriver. They lack fundamental security controls like authentication, encryption, or even basic access control lists. When these protocols are wrapped in modern transport layers to allow for remote management, they become a goldmine for anyone performing reconnaissance.
The core issue is that protocol gateways often act as transparent bridges. They translate requests from an IT-friendly protocol to an OT-native one, but they rarely perform any validation on the commands being passed through. If you can reach the gateway, you can often reach the devices behind it.
For instance, the Modbus protocol includes a Report Device Identity function code. In a standard deployment, this command is used for maintenance. However, when exposed through a gateway, it becomes an unauthenticated discovery tool. A simple request can force the gateway to return the vendor, product code, and firmware version of every device on the serial bus.
Similarly, EtherNet/IP uses the Common Industrial Protocol (CIP) to manage communications. The "List Identity" command is designed to help management stations find devices on the network. Because this command is broadcast-capable, an attacker can send a single UDP packet to a gateway and receive a detailed inventory of every CIP-compliant device connected to that gateway.
Technical Execution and Reconnaissance
When conducting a penetration test on an industrial environment, the goal is to map the network without triggering alarms or causing a denial-of-service condition. Because these devices are often fragile, aggressive port scanning is a recipe for disaster. Instead, you should focus on protocol-specific enumeration.
If you are dealing with EtherNet/IP, you can use Wireshark to capture and analyze the traffic patterns of the "List Identity" command. The structure is straightforward. By crafting a packet that targets the CIP connection manager, you can effectively "walk" the backplane of a rack-mounted system.
// Example of a CIP List Identity request structure
Encapsulation Header:
Command: List Identity (0x0063)
Length: 0
Session Handle: 0x00000000
Status: 0x00000000
Sender Context: 0x0000000000000000
Options: 0x00000000
This request doesn't require a session handle or any authentication. If the gateway is configured to pass these requests through, it will respond with a list of all modules in the rack, including their specific hardware revisions and serial numbers. This is effectively the "whoami" of the industrial world.
The Reality of Modern Industrial Exposure
During a recent research engagement, we found that many of these devices are not just exposed; they are misconfigured to the point of being "honey-pots" for anyone with a basic understanding of industrial protocols. The lack of authentication means that once you have discovered the device, you often have the ability to interact with it directly.
In a typical engagement, you will find that the gateway is the only thing standing between your scanning machine and the actual control logic of a factory floor. If you can identify the specific PLC model, you can often find publicly available documentation that details the exact register maps required to change the state of the device. The impact of this is not just data exfiltration; it is the potential for physical disruption.
Defensive Strategies for the OT Perimeter
Defending these systems requires a shift in mindset. If you are responsible for securing these networks, the first step is to stop treating the gateway as a transparent pipe. You must implement strict firewall rules that drop all unsolicited traffic from the IT network to the OT network.
Furthermore, you should look into OWASP's guidance on Identification and Authentication Failures, which, while web-focused, is highly applicable here. If your industrial devices support authenticated versions of these protocols, such as secure CIP, enable them immediately. If they do not, they should be physically or logically isolated from any network that has a path to the internet.
Do not rely on the obscurity of industrial protocols to protect your assets. The tools to map these networks are readily available, and the protocols themselves are well-documented. If you can find your own devices using these techniques, so can anyone else. Start by auditing your gateway configurations and ensuring that discovery commands are disabled or restricted to known, trusted management stations. The era of "security through obscurity" in industrial control systems ended years ago, and it is time to start treating these assets with the same level of rigor as your most sensitive enterprise servers.
Vulnerability Classes
Tools Used
Target Technologies
Attack Techniques
OWASP Categories
Up Next From This Conference
Similar Talks

Kill List: Hacking an Assassination Site on the Dark Web

Anyone Can Hack IoT: A Beginner's Guide to Hacking Your First IoT Device




