{"id":1196,"date":"2023-03-21T23:26:47","date_gmt":"2023-03-21T20:26:47","guid":{"rendered":"https:\/\/zerontek.com\/zt\/?p=1196"},"modified":"2023-03-21T23:37:16","modified_gmt":"2023-03-21T20:37:16","slug":"introducing-ics-recon-simplifying-device-discovery-and-fingerprinting-in-industrial-control-systems","status":"publish","type":"post","link":"https:\/\/zerontek.com\/zt\/2023\/03\/21\/introducing-ics-recon-simplifying-device-discovery-and-fingerprinting-in-industrial-control-systems\/","title":{"rendered":"Introducing ICS Recon: Simplifying Device Discovery and Fingerprinting in Industrial Control Systems"},"content":{"rendered":"\n<p>I&#8217;ve always been fascinated by network scanning and reconnaissance (Recon). This interest dates back more than 20 years, and I continue to apply it in the realm of ICS. Please visit my &#8220;<a href=\"https:\/\/github.com\/selmux\/ICS-Security\" target=\"_blank\" rel=\"noreferrer noopener\">ICS-Security<\/a>&#8221; project on GitHub, where I share numerous ICS tools, many of which are categorized as Recon tools. I actively research and develop Recon tools on a daily basis. <\/p>\n\n\n\n<p>I couldn&#8217;t help but laugh when I introduced myself to ChatGPT-4 today. I shared with it that:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>I&#8217;m an ICS cybersecurity researcher and blogger . I also write tools for ics . Whats a cool tool do you suggest for ics ? i prefer the tool should be easy and simple to write<\/p>\n<\/blockquote>\n\n\n\n<p>The response was:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"942\" height=\"1024\" src=\"https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2023\/03\/tool-gpt-942x1024.jpg\" alt=\"\" class=\"wp-image-1197\" srcset=\"https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2023\/03\/tool-gpt-942x1024.jpg 942w, https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2023\/03\/tool-gpt-276x300.jpg 276w, https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2023\/03\/tool-gpt-768x835.jpg 768w, https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2023\/03\/tool-gpt.jpg 1010w\" sizes=\"auto, (max-width: 942px) 100vw, 942px\" \/><\/figure>\n\n\n\n<p>I&#8217;m already following its advice \ud83d\ude42 . I&#8217;m currently working on my project, &#8220;ICSrank,&#8221; which is a collection of Recon and OSINT tools. Here&#8217;s the ChatGPT description of my ICSrank project:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"666\" src=\"https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2023\/03\/icsrank-ask-1024x666.jpg\" alt=\"\" class=\"wp-image-1200\" srcset=\"https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2023\/03\/icsrank-ask-1024x666.jpg 1024w, https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2023\/03\/icsrank-ask-300x195.jpg 300w, https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2023\/03\/icsrank-ask-768x500.jpg 768w, https:\/\/zerontek.com\/zt\/wp-content\/uploads\/2023\/03\/icsrank-ask.jpg 1105w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>I&#8217;ve always been fascinated by network scanning and reconnaissance (Recon). This interest dates back more than 20 years, and I continue to apply it in the realm of ICS. Please visit my &#8220;ICS-Security&#8221; project on GitHub, where I share numerous ICS tools, many of which are categorized as Recon tools. I actively research and develop [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[178,4,3,46,76,81,48,201],"tags":[179,7,13,6,75,80,12,47,199,200],"class_list":["post-1196","post","type-post","status-publish","format-standard","hentry","category-chatgpt","category-cyber-security","category-ics-security","category-ics-tools","category-icsrank","category-osint","category-ot-security","category-recon","tag-chatgpt","tag-cyber-security","tag-ics","tag-ics-security","tag-icsrank","tag-osint","tag-ot","tag-ot-security","tag-recon","tag-reconnaissance"],"_links":{"self":[{"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/posts\/1196","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/comments?post=1196"}],"version-history":[{"count":4,"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/posts\/1196\/revisions"}],"predecessor-version":[{"id":1203,"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/posts\/1196\/revisions\/1203"}],"wp:attachment":[{"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/media?parent=1196"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/categories?post=1196"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/tags?post=1196"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}