In my recent podcast “ICS/OT Blue Team” on ICS Arabia ποΈ with Shaker Hashlan, we dived into a topic critical for OT defenders. As promised, hereβs a list of these tools, categorized for ease of use. Letβs explore their capabilities and where you can find them:
Network / Packets / Scanning
- Nmap
A classic tool for network discovery and security auditing. It helps you map out your network, identify open ports, and detect potential vulnerabilities.
π nmap.org - Wireshark
The go-to tool for network protocol analysis. Wireshark captures and inspects packets in real-time, offering invaluable insights into network traffic.
π wireshark.org
Detection
- Snort
Snort is an open-source intrusion detection and prevention system (IDS/IPS) that monitors network traffic in real time, identifying suspicious activity using predefined and custom rules.
π snort.org - Suricata
Another robust IDS and network monitoring tool capable of multi-threaded detection for real-time analysis.
π suricata.io - Zeek (formerly Bro)
A network security monitor that transforms raw traffic into structured, high-level logs for detailed analysis.
π zeek.org - Sysmon
A Windows system service that logs system activity, providing detailed insights into processes, network connections, and file creation events.
π Sysmon
Asset Inventory
- AssetTiger
A free, cloud-based asset management tool to keep track of your OT devices and their statuses.
π assettiger.com
Protection
- OpenZiti
A zero-trust networking platform that allows secure connectivity without exposing services to the internet.
π openziti.io
Incident Response (IR)
- Google GRR
A tool for remote forensic analysis, allowing investigators to gather and analyze data from machines across your network.
π github.com/google/grr - Velociraptor
A digital forensics and incident response (DFIR) toolset for analyzing Windows systems.
π https://docs.velociraptor.app - OSSEC (OSEc)
A host-based intrusion detection system (HIDS) that monitors log files, file integrity, and more.
π ossec.net
SOC Operations
- Elastic Stack (ELK)
A complete data analysis and visualization solution perfect for building security operations centers (SOC).
π elastic.co - Wazuh
An open-source security platform that provides intrusion detection, log management, and monitoring for compliance.
π wazuh.com
Threat Intelligence
- MISP (Malware Information Sharing Platform)
MISP is an open-source threat intelligence platform that enables organizations to collect, share, and collaborate on threat data.
π misp-project.org
Signatures
- YARA
A tool for creating and analyzing rules to identify and classify malware samples.
π github.com/Yara-Rules/rules
Rule Translation
- Sigma
A generic signature format that translates detection rules into queries for different SIEM platforms.
π Sigma GitHub
Firewall
pfSense
A powerful, open-source firewall and router solution with enterprise-level features.
π pfsense.org
In conclusion, these tools represent just a fraction of the vast ecosystem of open-source solutions available for OT defenders. We are not endorsing or promoting any specific tool, nor have we tested them all exhaustively. This list is based on their known existence and popularity within the cybersecurity community. If you have other tools you’d like to suggest, feel free to share themβwe’re always open to expanding the list and raising awareness about valuable resources.