Site Map
TRAINING
Understanding, Assessing and Securing Industrial Control Systems
Building and Securing Industrial Control Systems
Cyber Security for Industrial Control Systems
Introduction to Cyber Security for Industrial Control Systems
Conducting Security Assessments for Industrial Control Systems
Performing an Industrial Control System Risk Assessment
Understanding and Selecting Security Controls for Industrial Control Systems
RESOURCES
Real-Time ICS Vulnerability Trend Data
ICS Security Alerts and Advisories
Cyber Response and Incident Handling
Learning Feed from Twitter
How-To Reference and Training Information
Demonstration Videos
Webcasts
Cheat Sheets
Training Material via External Websites
Linux/UNIX Reference Material and Websites
Useful Video Feeds
SANS ICS Resources
Conferences and Summits
Technical Presentations and White Papers
Webinars / Webcasts
Open-Source Intelligence
Industrial Automation, Safety and Security Reading
Industrial Automation and Control Technologies
Using Shodan
TOOLS - A SCADA Hacker's Toolset
Testing Frameworks
Kali Linux
Backtrack
Network Security Toolkit
OpenVAS
Secmic
Standalone Security Applications for Windows, Mac OS, Linux
Android and iOS Tablet Security Applications
Documentation
Websites
Supplimental Tools
SCADA/ICS System Exploits
SCADA/ICS Vulnerability Reference List
Metasploit Modules for SCADA-related Vulnerabilities
SCADA/ICS Demonstration & Evaluation Software
Network Exploits
Host-based Exploits
Dragonfly/Havex Resources
Dragonfly/Havex Reference Material
Detailed Analysis and Reports
Industrial Control System Cyber Emergency Response Team (ICS-CERT)
Blogs and Posts of Interest
Indicators of Compromise
White Papers Co-Authored by SCADAhacker
Other Valuable Information
Diagrams
Duqu Resources
Duqu Reference Material
How Duqu Works
Industrial Control System Cyber Emergency Response Team (ICS-CERT)
Detection and Removal Tools
Blogs and Posts of Interest
Stars Worm/Malware
Microsoft Security Response Center
Other Valuable Information
Diagrams
Facts at a Glance
Contributors
Stuxnet Resources
Stuxnet Reference Material
How Stuxnet Works
Stuxnet Research
White Papers Co-Authored by SCADAhacker
Mitigation Recommendations by SCADAhacker
Siemens Automation
Industrial Control System Cyber Emergency Response Team (ICS-CERT)
Symantec Security Focus
Microsoft Security Bulletins
Common Vulnerability & Exposure (CVE) References
Microsoft Malware Protection Center
Stuxnet Mitigation Recommendations
Demonstration Video - Introduction, Installation, and Injection Methods
Demonstration Video - Using Software Restrition Policy as a Mitigation
On the Lighter Side
LIBRARY
ICS Vulnerabilities
Standards
Best Practices
Assessment Guidance
Assessment Tools
Articles and White Papers
ICS Cyber Event Reference
H@ck3rS on SCADA - ICS Research Activities
Government
Roadmaps
Case Studies
Security Considerations for OPC
SCADA Basics
User Guides and Manuals
Cheat Sheets
Multimedia
On-Line Tools and Applications
Websites
On-Line News Sources
ABOUT
SCADAhacker in the News
Articles and Contributions
Technical Papers and Conference Presentations
ICS-CERT Attribution
Committee/Industry Membership
From the SCADAhacker blog
SCADASec News
Endorsements