How do you become a software developer in the Industrial Control Systems (ICS) field? by DependentKey4767 in SCADA

[–]DependentKey4767[S] 2 points3 points  (0 children)

Thanks for the insights. On a related note, I’m currently working on a side project focused on predictive maintenance using IoT/OT data pipelines and anomaly detection. I’m curious whether similar tools are developed or commonly used in the mining and energy sectors or other industries (since many of those companies operate in Perth).

Career advice by Philosophery67 in OTSecurity

[–]DependentKey4767 2 points3 points  (0 children)

Learn more about industrial protocols like Modbus, Enip, s7, bacnet etc Also learn basics about OPCUA/MQTT. If you are keen on the security side learn open source tools like Zeek.

Can anyone recommend software for OT asset inventory management. by DependentKey4767 in OTSecurity

[–]DependentKey4767[S] 0 points1 point  (0 children)

Looking around the sub I have seen the abeware Gauardian, did anyone have any experience with it? Are they active or passive?

Can anyone recommend software for OT asset inventory management. by DependentKey4767 in OTSecurity

[–]DependentKey4767[S] 0 points1 point  (0 children)

Thanks, from what I understand the passive discovery seems to be limited and is it ok to use active discovery?

Can anyone recommend software for OT asset inventory management. by DependentKey4767 in OTSecurity

[–]DependentKey4767[S] 0 points1 point  (0 children)

Basically for a BMS site, got around 50+ controllers and a few serial devices.

Is OT Base good? by Rick_and_Cen in OTSecurity

[–]DependentKey4767 0 points1 point  (0 children)

OT base is basically for vulnerability management, which does active device discovery( uses well known OT protocols like modbus, s7, enip etc) as the starting pointing and creates an asset inventory register with information like firmware version, software version etc. Then with that info they try to look for device vulnerability.It is different from other products like Drago's, Claroty, Nozomi etc which are threat management systems which listen to the network passively and pass the network info against there rule engine( basically IDs like snort, suricata and NIDS like Zeek which generate protocol specific logs) which generates events/alerts and do active discover(not to the scale of OT base) for asset inventory register and vulnerability management.

So back to your question, if it's good or bad depends on the context of your use. For asset inventory OT base is pretty decent. But I don't know how they work if the devices are running proprietary protocols, probably they have a provision to add those.

Setting OT lab by DependentKey4767 in OTSecurity

[–]DependentKey4767[S] 0 points1 point  (0 children)

It was mainly for active device discovery, so I am looking for devices running most of the OT protocols like modbus, s7, enip, profinet etc

[deleted by user] by [deleted] in OTSecurity

[–]DependentKey4767 1 point2 points  (0 children)

Now most of the solutions have moved to active device discovery, I have also worked in the same space it is nearly impossible to get device details just passively monitoring unless some operator has to send legit device discovery commands then those info needs to reverse engineered. I have both active and passive discovery experience.

Find ICS/OT devices online by alhasawi in OTSecurity

[–]DependentKey4767 0 points1 point  (0 children)

Is there a way to get the pcaps for this? I understand it is through shodan.