Metasploit Modules for SCADA-related Vulnerabilities
It is important to understand the likelihood that a
vulnerability can be exploited on a particular ICS or SCADA
system. One factor to use in this evaluation is whether an
automated exploit module has been created for the Metasploit
Framework. With the recent attention given by security
researchers to ICS / SCADA systems, there has been an
increased focus on the rapid deployment of these exploit
modules that leverage publicly disclosed proof-of-concept
(PoC) code.
The list below provides a summary of the current Metasploit
Framework modules that have been developed including all
information available for a particular system vulnerability.
You can navigate the complete Metasploit Framework
Repository by
clicking here. This link provides complete details of
each of the MSF modules included, how they are used, and
change management entries.