[CANCELED] X33FCON [ June 21-25, 2021] Build, Break, Secure (Live remote)

Discover the world of Industrial Control Systems with an attack mindset! In this training, we will follow a hands-on approach, growing from a very simple local process to a realistic ICS environment with 3 words in mind:
Build: how does it work?
Break: what are the weaknesses and how to exploit it?
🔒 Secure: what can we do to fix it?

This training will take place over 5 half-days.


You will perform a lot of lab sessions, including: programming a PLC in ladder logic, analyzing network captures of ICS protocols, perform Modbus (serial & tcp) requests, using Metasploit to compromise a Windows host and gather sensitive information from an Active Directory, and much more! The last half-day is dedicated to the Capture-the-Flag, in which you will apply the newly acquired techniques to compromise a corporate network, pivot to the ICS network and take control of the process to capture a flag with a robotic arm.
Moreover, the training doesn’t stop on the third day! With the WhiskICS training kit, you’ll be able to redo all the exercises after the training and continue experimenting with ICS security on your own.

Video presentation of the training

Course outline

HALF-DAY 1

  • Introduction to Industrial Control Systems
  • Automation basics & programming PLC
  • ICS protocols

HALF-DAY 2

  • Hacking the process
  • Attacking the non-ICS part of the PLC
  • PLC proprietary protocols
  • An introduction to safety

HALF-DAY 3

  • Process supervision: SCADA and DCS
  • Linking to corporate environments: Windows & Active Directory security
  • SCADA/DCS specific vulnerabilities
  • Industry 4.0 & IIoT

HALF-DAY 4

  • Capture the Flag

HALF-DAY 5

  • ICS cybersecurity general approach
  • Data exchange between ICS and the outside world
  • ICS security assessments

All the exercises are also covered in video:

Exercise: Programming a PLC

Exercice: Packet capture analysis

The CTF

To end the training, the Capture The Flag is always the most fun!

You’ll connect your VM to a VPN, and will have to compromise a Windows corporate environment, pivot to the ICS network and hack it in order to capture the flag!

The CTF setup is composed of real ICS components (Schneider & Siemens PLCs, Schneider SCADA software…) and will get a remote access to the setup and a video stream of the physical process so you can check if your attacks are working 🙂

What is included in the training?

The training will be taught remotely, live.

The training will take place from Monday 21st to Friday 25th, each day during the afternoon

By registering for this training, you’ll also get 30 days access to the online platform, including videos, the lab and CTF environments.

Target audience

This training aims at bridging the gap between IT and ICS: it is designed to allow OT professionals to understand the security challenges of ICS with an offensive mindset, while allowing IT professionals to discover the world of Industrial Control Systems and adapt their cybersecurity knowledge to this new world.

The training is heavily hands-on. While no ICS or pentest knowledge is required, it is recommended for attendees to have basic networking and computers skills (using virtual machines, the command line, understanding TCP/IP…).

Attendees need to bring a laptop with Virtualbox, capable of running 64-bits virtual machines (8GB RAM & 50GB free disk space recommended).

This training is not suited for people that already have a strong ICS cybersecurity technical experience.

Pricing and registration

The training is priced around 1000€ VAT excluded and you can register directly on X33FCON’s website : https://www.x33fcon.com/#!/t/ics.md

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: