Skip to content

Latest commit

 

History

History
275 lines (207 loc) · 10.1 KB

ics_scada.md

File metadata and controls

275 lines (207 loc) · 10.1 KB

Scanning ICS/SCADA Devices

  • ICS stands for Industrial Control Systems
  • SCADA stands for Supervisory Control And Data Acquisition.

In a nutshell, Industrial control systems (ICS) are “computers” (PLC) that control the world around you. They’re responsible for managing the air conditioning in your office, the turbines at a power plant, the lighting at the theatre or the robots at a factory

Examples of ICS/SCADA devices and applications

Here we report some of the most common SCADA systems with relative common use cases and query used on shodan to find them.

  • BACnet (port 47808): is a communications protocol for building automation and control networks. It was designed to allow communication of building automation and control systems for applications such as heating, air-conditioning, lighting, and fire detection systems.
  • Codesys: over 250 device manufacturers from different industrial sectors offer automation devices with a CODESYS programming interface. Consequently, thousands of users such as machine or plant builders around the world employ CODESYS for automation tasks.
  • DNP3 (port 20000): Distributed Network Protocol is a set of communications protocols used between components in process automation systems. Its main use is in utilities such as electric and water companies.
  • EtherNet/IP (port 44818): was introduced in 2001 and is an industrial Ethernet network solution available for manufacturing automation. General Electric (product:"general electric")
  • GE Industrial Solution: Service Request Transport Protocol (GE-SRTP) protocol is developed by GE Intelligent Platforms (earlier GE Fanuc) for transfer of data from PLCs.
  • HART IP: The HART Communications Protocol (Highway Addressable Remote Transducer Protocol) is an early implementation of Fieldbus, a digital industrial automation protocol. Its most notable advantage is that it can communicate over legacy wiring.
  • IEC 60870–5–104
  • IEC-104 (port 2404):is one of the IEC 60870 set of standards which define systems used for SCADA in electrical engineering and power system automation applications.
  • Mitsubishi Electric (product:“Mitsubishi”): MELSEC-Q Series use a proprietary network protocol for communication. The devices are used by equipment and manufacturing facilities to provide high-speed, large volume data processing and machine control.
  • Modbus (port 502): a popular protocol for industrial control systems (ICS). It provides easy, raw access to the control system without requiring any authentication.
  • Omron: Factory Interface Network Service (FINS), is a network protocol used by Omron PLCs, over different physical networks like Ethernet, Controller Link, DeviceNet and RS-232C.
  • PCWorx: is a protocol and program by Phoenix Contact used by a wide range of industries. We can find them by doing the following queries: port:20547,1962 PLC port:2455 operating system port:9600 response code
  • ProConOS:a high-performance PLC run time engine designed for both embedded and PC based control applications.
  • Red Lion (port 789 product:"Red Lion Controls"): Crimson v3.0 desktop software’s protocol used when communicating with the Red Lion Controls G306a human machine interface (HMI).
  • Siemens S7 (port 102): S7 Communication, a proprietary protocol that runs between programmable logic controllers (PLCs) of the Siemens S7 family.
  • Tridium Niagara Fox (ports 1911 and 4911): the Fox protocol, developed as part of the Niagara framework from Tridium, is most commonly seen in building automation systems (offices, libraries, Universities, etc.).

Scanning ICS/SCADA Devices

ICS SCADA systems make up an important part in critical infrastructures found in power plants, chemical factories, oil refineries and also larger complexes.

It is advised to run -sT scans to open and close each connection, since these devices may be very susceptible.

The default scan we may do is:

nmap -Pn -sT --scan-delay 1s --max-parallelism 1 \
    -p
    80,102,443,502,530,593,789,1089-1091,1911,1962,2222,2404,4000,4840,4843,4911,9600,19999,20000,20547,34962-34964,34980,44818,46823,46824,55000-55003 \
    <target>

Each of these ports correspond to a known ICS SCADA protocol.

From various sources, this is what we know about ports used by SCADA systems:

BACnet/IP -- UDP/47808 Siemens S7 -- TCP/102 DNP3 -- TCP/20000, UDP/20000 EtherCAT -- UDP/34980 Ethernet/IP -- TCP/44818, UDP/2222, UDP/44818 FL-net -- UDP/55000 to 55003 Foundation Fieldbus HSE -- TCP/1089 to 1091, UDP/1089 to 1091 ICCP -- TCP/102 Modbus TCP -- TCP/502 OPC UA binary -- Vendor application specific OPC UA discovery server -- TCP/4840 OPC UA XML -- TCP/80, TCP/443 PROFINET -- TCP/34962 to 34964, UDP/34962 to 34964 ROC PLus -- TCP/UDP 4000 Red lion -- TCP/789 Niagara Fox -- TCP/1911, TCP/4911 IEC-104 -- TCP/2404 Codesys -- Vendor application specific PCWorx -- TCP/20547, TCP/2455, TCP//9600

Anyway there is a vast number of protocols being used by different types of vendors who don't release documentation on the ports used, anyway online there are compilation of found ports such as:

ABB Ranger 2003: * TCP/10307, TCP/10311, TCP/10364 to 10365, TCP/10407, TCP/10409 to 10410, TCP/10412, * TCP/10414 to 10415, TCP/10428, TCP/10431 to 10432, TCP/10447, TCP/10449 to 10450, * TCP/12316, TCP/12645, TCP/12647 to 12648, TCP/13722, TCP/13724, TCP/13782 to 13783, * TCP/38589, TCP/38593, TCP/38600, TCP/38971, TCP/39129, TCP/39278

Emerson / Fisher ROC Plus: * TCP/UDP/4000

Foxboro/Invensys Foxboro DCSFoxApi * TCP/UDP/55555

Foxboro/Invensys Foxboro DCS AIMAPI * TCP/UDP/45678

Foxboro/Invensys Foxboro DCS Informix * TCP/UDP/1541

Iconics Genesis32GenBroker (TCP): * TCP/18000

Johnson Controls MetasysN1: * TCP/UDP/11001

Johnson Controls MetasysBACNet: * UDP/47808

OSIsoft PI Server: * TCP/5450

Siemens Spectrum Power TG: * TCP/50001 to 50016, TCP/50018 to 50020, * UDP/50020 to 50021, TCP/50025 to 50028, * TCP/50110 to 50111

SNC GENe * TCP/38000 to 38001, TCP/38011 to 38012, * TCP/38014 to 38015, TCP/38200, * TCP/38210, TCP/38301, TCP/38400, * TCP/38700, TCP/62900, TCP/62911, * TCP/62924, TCP/62930, TCP/62938, * TCP/62956 to 62957, TCP/62963, * TCP/62981 to 62982, TCP/62985, * TCP/62992, TCP/63012, TCP/63027 to 63036, * TCP/63041, TCP/63075, TCP/63079, * TCP/63082, TCP/63088, TCP/63094, TCP/65443

Telvent OASyS DNA: * UDP/5050 to 5051, TCP/5052, TCP/5065, * TCP/12135 to 12137, TCP/56001 to 56099

We can generally use plcscan to find PLCs online.

Finding HMI (Human Machine Interface)

Sielco Sistemi Winlog

nmap -Pn -sT -p46824 <target>

it can be remotely exploitable with vulnerability winlog_runtime_2 from metasploit.

Siemens SIMATIC S7 PLCs

These devices from the S7 300/400 family use the S7comm protocol for PLC programing, data exchange between PLCs and SCADA systems and diagnostics.

These PLCs generally listen on port 102. We can check for the presence of a PLC using the s7comm protocol with the following nmap launch:

nmap -Pn -sT -p102 --script s7-info <target>

Modbus Devices

Modbus TCP/IP is the most common communication protocol used to transmit information among SCADA devices.

We can discover a Modbus device with nmap by doing something like:

nmap -Pn -sT -p502 --script modbus-discover <target>

There is also a more specific script called modscan which actually discovers modscan devices.

We can also try to enumerate all slave IDs by setting the script argument aggressive, like this:

nmap -sT -Pn -p502 --script modbus-discover --script-args modbus-discover.aggressive=true <target>

BACnet Devices

BACnet devices are very common for interconnecring and controlling HVAC, power and ventilation systems and other building automation stuff.

We can gather a lot of information about these devices with:

nmap -Pn -sU -p47808 --script bacnet-info <target>

If the protocol is not correct we may get a message like:

BACNetADPU Type: Error (5)

but this again is a sign that we are communicating with a BACnet device.

We may also discover BACnet Broadcast Management Device (BBMD), which is installed to allow broadcast requests across networks. However this functionality can be found in a script called BACnet-discover-enumerate.nse.

Ethernet/IP SCADA Devices

Ethernet/IP is a popular protocol used in the industry that uses ethernet as the transport layer and CIP for providing services and profiles needed for applications.

Ethernet/IP devices operate on UDP port 44818 and we can gather information through nmap with:

nmap -Pn -sU -p44818 --script enip-info <target>

Niagara Fox Devices

Niagara Fox protocol operates on TCP ports 1911 and 4911. We can discover them and query for information with nmap by issuing:

nmap -Pn -sT -p1911,4911 --script fox-info <target>

ProConOS Devices

ProConOS is a PLC runtime engine designed for embedded or PC-based control applications.

With nmap we can do:

nmap -Pn -sT -p20547 --script proconos-info <target>

NOTE: Consider that Phoenix Contact Software-s ProConOS applications do not have an authentication system, so they are considere vulnerable, since the entire ladder logic may be changed remotely.

Omrom PLC Devices

These devices use the FINS protocol which use TCP or UDP 9600 ports to communicate over the network with other machines.

nmap -Pn -sU -p9600 --script omrom-info <target>

These devices may also operate on TCP port, so we may run additionally the following scan:

nmap -Pn -sT -p9600 --script omrom-info <target>

These devices generally transmit information in plaintext, so if we are in the same network we should enable some sort of packet sniffing.

PCWorx Devices

PCWorx devices allow unaunthenticated requests that query for system information.

With nmap we can enumerate them with:

nmap -Pn -sT -p1962 --script pcworx-info <target>