Information Security News
SCADA environments are a big interest for me. As responsible of the information security of an utility company, I need to ensure that risks inside those platforms are minimized in a way thay any control I place does not interfiere at all with the protocol and system function. That is why running things like metasploit or nexpose could be really dangerous if they are not well parameterized, as it could block the control to the RTU and IED and potentially cause a disaster if a system variable goes beyond control.
There is an alternative to perform vulnerability asessments to SCADA devices less risky and with good result information. You can use nmap scripting engine to add vulnerability scanning functionality. The software can be downloaded from http://www.computec.ch/mruef/software/nmap_nse_vulscan-1.0.tar.gz. The csv files are vulnerability databases and you need to place them into a directory named vulscan in the same directory as all other .nse scripts. The vulscan.nse script needs to be with all the other nse scripts. Once installed into the nmap scripts directory, you are all set.
Let's how it works. First step to perform vulnerability asessment is to check open ports and versions of all servers running there:
The vulscan script will get the service scan information as input to gather vulnerabilities inside the vulnerability databases. Now you need to use at least the following arguments:
You can also use any other optional arguments used normally with nmap, as well as arguments to the vulscan script, like:
In the following example, nmap will perform a SYN scan, service scan and get the information as input to correlate with the Security Consulting Information Process Database. The command being run is nmap -sS -sV --script=vulscan.nse --script-args vulscandb=scipvuldb.csv 192.168.0.110:
In future diaries I will show other nmap scripts I like to perform vulnerability asessment and pentest.
SANS Brings World-Class Information Security Training to Las Vegas
The Herald | HeraldOnline.com
SANS offers a myriad of free resources to the InfoSec community including consensus projects, research reports, and newsletters; and it operates the Internet's early warning system - the Internet Storm Center. At the heart of SANS are the many security ...
IT Opportunities Surrounding Shadow IT
Infosecurity Magazine (blog)
The Cloud Security Alliance comprises many subject matter experts from a wide variety of disciplines, united in our objectives: to promote a common level of understanding between the consumers and providers of cloud computing regarding the necessary ...
Leading Data Erasure Vendor Tabernus Certified by NATO Information ...
SBWire (press release)
The Defence InfoSec Product Co-Operation Group UK (DIPCOG) is a UK Ministry of Defence forum run by a committee composed of representatives primarily from the MoD and CESG. DIPCOG approves products and services as being suitable for use ...
Posted by InfoSec News on Jul 01http://www.greenvilleonline.com/article/20130629/NEWS10/306290012/USC-hit-another-personal-data-breach
Posted by InfoSec News on Jul 01http://www.scmp.com/news/hong-kong/article/1272163/chinese-university-issues-new-security-alert-students-over-hacking
Posted by InfoSec News on Jul 01http://thehill.com/blogs/hillicon-valley/technology/308563-nsa-revelations-throw-wrench-into-cybersecurity-push
Posted by InfoSec News on Jul 01https://www.computerworld.com/s/article/9240440/New_disk_wiper_malware_linked_to_attacks_in_South_Korea_researchers_say
Posted by InfoSec News on Jul 01http://www.thecoast.ca/RealityBites/archives/2013/06/27/was-halifaxs-e-vote-hacked