Introduction to Industrial Control Systems Security
This talk provides an introductory overview of Industrial Control Systems (ICS) and Operational Technology (OT) security, contrasting them with traditional Information Technology (IT) environments. It highlights the unique security challenges of ICS, such as the prioritization of system availability and resilience over confidentiality and integrity. The speakers discuss the Purdue Model for ICS network segmentation and emphasize the importance of understanding network architecture and physical processes for effective security assessment.
Why Your IT Security Playbook Will Fail in an OT Environment
TLDR: Industrial Control Systems (ICS) prioritize availability and physical safety over the confidentiality and integrity models standard in IT. Security researchers often struggle here because they apply IT-centric patching and scanning habits to fragile, legacy hardware that can crash under standard network discovery. Understanding the Purdue Model for network segmentation is the baseline requirement for anyone attempting to secure or audit these environments.
Most security professionals treat an industrial network like a standard enterprise environment with a few extra VLANs. This is a dangerous misconception. In a typical IT environment, if a server goes down, you lose data or productivity. In an Operational Technology (OT) environment, if a controller goes down, you might lose a water supply, trigger a chemical spill, or cause a physical explosion. The stakes are fundamentally different because the systems are built for resilience and continuous uptime, not for the rapid, iterative patching cycles we see in modern web development.
The Fallacy of the Air Gap
Many organizations operate under the assumption that their industrial control systems are air-gapped. This is almost never true in practice. Even if a system is not directly connected to the public internet, it is almost certainly connected to an IT network that is. This connectivity is necessary for data logging, remote maintenance, and enterprise resource planning.
When you conduct a penetration test on an OT network, you are not just looking for vulnerabilities in software. You are looking for the intersection points between IT and OT. The Purdue Model provides a structured way to visualize these layers, from the enterprise level down to the field devices like PLCs and sensors. If you do not understand how these layers communicate, you will miss the most critical attack vectors. The most common entry point is not a direct exploit of a PLC, but a pivot from a compromised workstation in the IT layer that has legitimate, authenticated access to the HMI (Human Machine Interface) or the engineering workstation.
Why Standard Scanning Tools Are Dangerous
In an IT environment, running a aggressive vulnerability scan is a standard part of the reconnaissance phase. In an OT environment, this is a recipe for a disaster. Many legacy devices, such as older PLCs or specialized industrial gateways, have fragile network stacks. A simple Nmap scan can cause these devices to hang or reboot, leading to a loss of process control.
If you are tasked with assessing these systems, you must move away from automated, high-volume scanning. Instead, focus on passive traffic analysis. Use tools that can interpret industrial protocols like Modbus, DNP3, or EtherNet/IP without injecting traffic that could disrupt the process. If you must perform active discovery, do it during a scheduled maintenance window and with the explicit, written approval of the plant operators. They are the ones who will have to deal with the fallout if your scan triggers a safety shutdown.
The Reality of Patching in OT
The advice to "patch everything" is standard in IT, but it is often impossible in OT. Many industrial systems run on proprietary, vendor-locked software that is no longer supported or cannot be updated without voiding the manufacturer's warranty. Furthermore, the testing required to ensure a patch does not break a critical process can take months.
Instead of focusing on patching, focus on compensating controls. If you cannot patch a vulnerable HMI, can you isolate it behind a firewall that only allows traffic from specific, authorized engineering workstations? Can you implement strict application whitelisting to ensure that only approved binaries run on the system? These are the types of questions that provide real value to an organization. You are not just identifying a CVE; you are helping the client manage risk in a way that respects the physical constraints of their environment.
Building Your Own Lab
You cannot learn OT security by reading manuals. You need hands-on experience with the hardware. While you can find some industrial equipment on the secondary market, be aware that it is rarely plug-and-play. You will need to source the specific cables, software, and licenses required to configure these devices.
If you are serious about this field, look for opportunities to volunteer or participate in specialized training environments like the ICS Village. These environments allow you to experiment with real industrial hardware in a safe, controlled setting. You will quickly learn that the "security" of these devices is often non-existent by design. Many PLCs have no concept of authentication, and their communication protocols are entirely unencrypted. Once you have access to the network, you have access to the process.
The Path Forward
The next time you are on an engagement that touches an OT environment, stop thinking like a web application pentester. Forget about finding the latest RCE in a web framework. Start looking at the network topology. Ask to see the architecture diagrams. Talk to the plant operators and ask them what happens if a specific device loses power or communication.
Your goal is to understand the process. If you understand the process, you will understand where the risks are. The most effective security measures in OT are often the simplest: proper network segmentation, strict access control, and a deep, granular understanding of the traffic flowing between the IT and OT layers. Do not be the person who crashes a water treatment plant because you wanted to see if you could get a response from a legacy controller. Be the person who identifies the architectural flaw that allows an attacker to manipulate that controller in the first place.
Target Technologies
Attack Techniques
Up Next From This Conference

Breaking Secure Web Gateways for Fun and Profit

Listen to the Whispers: Web Timing Attacks That Actually Work

Abusing Windows Hello Without a Severed Hand
Similar Talks

Unmasking the Snitch Puck: The Creepy IoT Surveillance Tech in the School Bathroom

Anyone Can Hack IoT: A Beginner's Guide to Hacking Your First IoT Device

