Unveiling the Risks of Exposed T5 PLCs, Vulnerable Routers, and RTSP MisconfigurationsWelcome to the 21st installment of “OT Hunt” where we dive into the challenges and opportunities within the realm of ICS/OT devices…Dec 9Dec 9
How to Find Water Systems on the Internet: A Guide to ICS/OT OSINTWelcome to the 19th installment of “OT Hunt” where we delve into the world of ICS/OT devices connected to the internet. The primary aim of…Sep 30Sep 30
OT Hunt: clearSCADAWelcome to the 18th installment of “OT Hunt” where we delve into the world of ICS/OT devices connected to the internet. The primary aim of…Aug 19Aug 19
How to Find and Probe ENCO PLCs on the Internet Just Like FrostyGoop malwareWelcome to the 17th installment of “OT Hunt” where we delve into the world of ICS/OT devices connected to the internet. The primary aim of…Jul 24Jul 24
Crowdstrike Windows outage : a philosophical perspectiveToday, a very important event happened worldwide: the outage of many computer systems affecting airports, banks, supermarkets, payment…Jul 19Jul 19
Finding WAGO 750–88x PLC Using GoogleWelcome to the 16th installment of “OT Hunt” where we delve into the world of ICS/OT devices connected to the internet. The primary aim of…Jul 2Jul 2
Automating ICS/OT File Extension Searches Across PlatformsI was inspired by the SCADA-Common-File-Extensions.tsv list to create a Python script that automates the search for ICS/OT file extensions…Jun 7Jun 7
How Google Can Be Used in ICS/OT OSINTWelcome to the second installment of our series “ICS/OT OSINT” where we delve into the use of Open Source Intelligence (OSINT) to boost…May 2May 2
OT Hunt: Analyzing CODESYS Security with MITRE T0886Welcome to the 15th installment of “OT Hunt” where we delve into the world of ICS/OT devices connected to the internet. The primary aim of…Apr 23Apr 23