Home -> Site Map

Site Map

HOME

TRAINING
    Understanding, Assessing and Securing Industrial Control Systems
    Building and Securing Industrial Control Systems
    Cyber Security for Industrial Control Systems
    Introduction to Cyber Security for Industrial Control Systems
    Conducting Security Assessments for Industrial Control Systems
    Performing an Industrial Control System Risk Assessment
    Understanding and Selecting Security Controls for Industrial Control Systems

RESOURCES
    Real-Time ICS Vulnerability Trend Data
    ICS Security Alerts and Advisories
    Cyber Response and Incident Handling
    Learning Feed from Twitter
    How-To Reference and Training Information
        Demonstration Videos
        Webcasts
        Cheat Sheets
        Training Material via External Websites
        Linux/UNIX Reference Material and Websites
        Useful Video Feeds
    SANS ICS Resources
    Conferences and Summits
    Technical Presentations and White Papers
    Webinars / Webcasts
    Open-Source Intelligence
    Industrial Automation, Safety and Security Reading
    Industrial Automation and Control Technologies
    Using Shodan
    TOOLS - A SCADA Hacker's Toolset
        Testing Frameworks
           Kali Linux
           Backtrack
           Network Security Toolkit
           OpenVAS
           Secmic
        Standalone Security Applications for Windows, Mac OS, Linux
        Android and iOS Tablet Security Applications
        Documentation
        Websites
        Supplimental Tools
    SCADA/ICS System Exploits
        SCADA/ICS Vulnerability Reference List
        Metasploit Modules for SCADA-related Vulnerabilities
    SCADA/ICS Demonstration & Evaluation Software
    Network Exploits
    Host-based Exploits
    Dragonfly/Havex Resources
        Dragonfly/Havex Reference Material
            Detailed Analysis and Reports
            Industrial Control System Cyber Emergency Response Team (ICS-CERT)
            Blogs and Posts of Interest
            Indicators of Compromise
            White Papers Co-Authored by SCADAhacker
            Other Valuable Information
            Diagrams
    Duqu Resources
        Duqu Reference Material
            How Duqu Works
            Industrial Control System Cyber Emergency Response Team (ICS-CERT)
            Detection and Removal Tools
            Blogs and Posts of Interest
            Stars Worm/Malware
            Microsoft Security Response Center
            Other Valuable Information
            Diagrams
            Facts at a Glance
            Contributors           
    Stuxnet Resources
        Stuxnet Reference Material
            How Stuxnet Works
            Stuxnet Research
            White Papers Co-Authored by SCADAhacker
            Mitigation Recommendations by SCADAhacker
            Siemens Automation
            Industrial Control System Cyber Emergency Response Team (ICS-CERT)
            Symantec Security Focus
            Microsoft Security Bulletins
            Common Vulnerability & Exposure (CVE) References
            Microsoft Malware Protection Center
        Stuxnet Mitigation Recommendations
        Demonstration Video - Introduction, Installation, and Injection Methods
        Demonstration Video - Using Software Restrition Policy as a Mitigation
    On the Lighter Side

LIBRARY
    ICS Vulnerabilities
    Standards
    Best Practices
    Assessment Guidance
    Assessment Tools
    Articles and White Papers
    ICS Cyber Event Reference
    H@ck3rS on SCADA - ICS Research Activities
    Government
    Roadmaps
    Case Studies
    Security Considerations for OPC
    SCADA Basics
    User Guides and Manuals
    Cheat Sheets
    Multimedia
    On-Line Tools and Applications
    Websites
    On-Line News Sources

ABOUT
    SCADAhacker in the News
    Articles and Contributions
    Technical Papers and Conference Presentations
    ICS-CERT Attribution
    Committee/Industry Membership
    From the SCADAhacker blog
    SCADASec News
    Endorsements

CONTACT