SCADA Hacking: Attacking SCADA/ICS Systems through the Human Machine Interface (HMI)

Welcome back, my aspiring SCADA/ICS cyberwarriors! Let’s begin by congratulating you on your foresight in committing to study SCADA/ICS hacking and security. This is certainly THE most important security issue this decade! In general, SCADA/ICS hacks have been of two types; Hack the protocols (modbus, DNP3, Profitnet, etc); Hack the Human Machine Interface (HMI) In […]

Continue Reading

Metasploit Basics, Part 23: Remote Windows Forensics with Metasploit

Welcome back, my Metasploit Cyber Warriors! Although Metasploit is an “exploitation framework” primarily used for hacking and penetration testing, it can also be used to provide some rudimentary forensic capabilities. It’s primary usefulness as a forensic tool is to gather evidence from a remote system when the physical system is unavailable to the investigator. In […]

Continue Reading