Industrial Control Systems and IoT Security Panel
This panel discussion explores the unique security challenges inherent in Industrial Control Systems (ICS) and Internet of Things (IoT) environments, focusing on the difficulty of patching legacy systems and the risks of connecting operational technology to the internet. The speakers highlight the critical need for comprehensive asset inventory and the risks posed by unmanaged, internet-connected devices. They emphasize that security in these sectors is a shared responsibility model, requiring collaboration between asset owners, vendors, and third-party service providers. The discussion also touches on the emerging role of AI in both defensive security and potential attack vectors.
The Silent Breach: Why Your OT Asset Inventory is Lying to You
TLDR: Industrial Control Systems (ICS) and Operational Technology (OT) environments are increasingly exposed to the internet, yet most organizations lack a basic, accurate asset inventory. This panel discussion highlights how unmanaged, legacy devices with insecure firmware serve as the primary entry point for attackers. Pentesters must shift their focus from traditional IT scanning to identifying these hidden, internet-connected OT assets to understand the true attack surface.
Security researchers often treat Industrial Control Systems as a black box, assuming they are air-gapped and unreachable. That assumption is a relic of the past. Today, the convergence of IT and OT has pushed these systems onto the public internet, often through misconfigured remote access services or poorly secured network appliances. When you are performing an external assessment, you are not just looking for web applications; you are looking for the bridge between the digital and physical worlds.
The Myth of the Air-Gap
The most dangerous vulnerability in any ICS environment is the lack of visibility. During the panel, the experts emphasized that you cannot secure what you do not know exists. Many organizations operate under the delusion that their PLCs and SCADA systems are isolated from the network. In reality, these devices are frequently exposed via VPNs, remote desktop services, or direct internet-facing interfaces.
For a pentester, this means your initial reconnaissance phase is critical. If you are not using tools like Shodan or Censys to identify exposed industrial protocols, you are missing the most significant attack vectors. Attackers are actively scanning for T1190 (Exploit Public-Facing Application) opportunities on these devices. Once they gain a foothold, they move laterally using T1210 (Exploitation of Remote Services) to reach the internal control network.
The Firmware Trap
Legacy hardware is the Achilles' heel of OT security. Unlike IT systems that receive regular patches, OT devices often run on firmware that has not been updated in a decade. When you encounter a device running an outdated version of a protocol stack, you are likely looking at a system that is vulnerable to known exploits that have been public for years.
This falls squarely into OWASP A06:2021 – Vulnerable and Outdated Components. In an IT environment, this is a nuisance. In an OT environment, it is a catastrophe. If you find a device with a known vulnerability, do not assume it has been mitigated. The operational constraints of these systems—where downtime is measured in thousands of dollars per minute—mean that patching is often deferred indefinitely.
The Reality of the Attack Surface
When you are on an engagement, look for the "hidden" devices. These are often small, unmanaged IoT sensors or gateways that were installed by a third-party contractor and forgotten. These devices are rarely included in the official asset inventory, yet they often have hardcoded credentials or insecure default configurations.
Consider the following scenario: you find a network gateway that provides remote access to a PLC. If you can compromise that gateway, you effectively bypass the perimeter. You are no longer attacking the IT network; you are sitting inside the OT network, where the security controls are often non-existent. The lack of authentication on many industrial protocols means that once you are inside, you can often send commands directly to the hardware.
Bridging the Gap
Defenders are struggling because they are trying to apply IT security models to OT environments. The panel made it clear that this is a shared responsibility model. Asset owners, vendors, and third-party service providers must collaborate to maintain an accurate, real-time asset inventory.
If you are working with a blue team, push them to implement better network segmentation. If a device does not need to talk to the internet, it should not be able to. Furthermore, encourage the use of NIST SP 800-82, which provides the gold standard for securing industrial control systems. It is not about making the network "unhackable," but about ensuring that when a device is compromised, the impact is contained.
What Comes Next
The rise of AI-driven attacks is the next frontier. We are already seeing attackers use large language models to generate more convincing phishing campaigns and to automate the discovery of vulnerabilities in proprietary firmware. As these tools become more accessible, the barrier to entry for attacking ICS environments will drop significantly.
For those of us in the field, the takeaway is simple: stop ignoring the OT side of the house. The next major incident will not come from a sophisticated zero-day exploit against a hardened server. It will come from a forgotten, internet-facing gateway running five-year-old firmware that someone forgot to turn off. Start looking for those devices today, because if you can find them, the people who want to do harm already have.
Vulnerability Classes
Target Technologies
Attack Techniques
OWASP Categories
Up Next From This Conference
Similar Talks

Unmasking the Snitch Puck: The Creepy IoT Surveillance Tech in the School Bathroom

The Dark Side of Bug Bounty




