{"id":1633,"date":"2024-12-31T20:47:19","date_gmt":"2024-12-31T17:47:19","guid":{"rendered":"https:\/\/zerontek.com\/zt\/?p=1633"},"modified":"2024-12-31T20:47:19","modified_gmt":"2024-12-31T17:47:19","slug":"2024-a-year-in-ot-cybersecurity","status":"publish","type":"post","link":"https:\/\/zerontek.com\/zt\/2024\/12\/31\/2024-a-year-in-ot-cybersecurity\/","title":{"rendered":"2024: A Year in OT Cybersecurity"},"content":{"rendered":"\n<p>As 2024 comes to a close, I\u2019m proud to reflect on an incredible year filled with contributions to OT cybersecurity through my blog and <strong><a href=\"https:\/\/www.youtube.com\/@icsarabiapodcast\" target=\"_blank\" rel=\"noreferrer noopener\">ICS Arabia Podcast<\/a><\/strong>. This year marked the completion of four years for my blog, and I interviewed 18 guests, surpassing previous years. My guests, a mix of Arabic and English speakers, brought a wealth of knowledge to the community.<\/p>\n\n\n\n<p>Additionally, I was deeply immersed in other projects, particularly <strong><a href=\"https:\/\/www.icsrank.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">ICSrank.com<\/a><\/strong>\u2014a tool I\u2019ve been developing to improve the discovery and security assessment of ICS\/OT devices. Stay tuned, as ICSrank is almost ready for launch!<\/p>\n\n\n\n<p>A heartfelt thank you to the ICS\/OT cybersecurity community and my podcast guests for their support, knowledge, and willingness to share. Here\u2019s a summary of this year\u2019s articles and podcasts:<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>ICS Arabia Podcast (2024)<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Total Episodes: 18<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Arabic:<\/strong> 11<\/li>\n\n\n\n<li><strong>English:<\/strong> 7<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Arabic Episodes<\/strong><\/h4>\n\n\n\n<ol class=\"wp-block-list\">\n<li><a href=\"https:\/\/youtu.be\/tXy6E09Wf2Y?si=L4epYxTaHPqush6S\" target=\"_blank\" rel=\"noreferrer noopener\">Zero Trust in ICS\/OT: A Comprehensive Deep Dive<\/a> &#8211; with Shaker Hashlan<\/li>\n\n\n\n<li><a href=\"https:\/\/youtu.be\/R20e4vERBsk?si=tpu78hyMCfLLeaJf\" target=\"_blank\" rel=\"noreferrer noopener\">Digital Twins in ICS\/OT<\/a> &#8211; with Nebras Alquarashi<\/li>\n\n\n\n<li><a href=\"https:\/\/youtu.be\/v4Py_PiGm7o?si=39z1Hx_Z8Wgj2J0S\" target=\"_blank\" rel=\"noreferrer noopener\">Conversation with a Kuwaiti Engineer on OT Cybersecurity and OWASP<\/a> &#8211; with Faisal Albuloushi<\/li>\n\n\n\n<li><a href=\"https:\/\/youtu.be\/v5k99atuCU8?si=NIhPILttcN_s6hgW\" target=\"_blank\" rel=\"noreferrer noopener\">Hunting Down Threats: ICS\/OT Edition<\/a> &#8211; with Shaker Hashlan<\/li>\n\n\n\n<li><a href=\"https:\/\/youtu.be\/CqP_SlpAvaM?si=N4IqM9R85Nus4-2L\" target=\"_blank\" rel=\"noreferrer noopener\">MITRE ATT&amp;CK for ICS\/OT<\/a> &#8211; with Shaker Hashlan<\/li>\n\n\n\n<li><a href=\"https:\/\/youtu.be\/J_15j0kDh3s?si=fIh4kIKeQhuWXKze\" target=\"_blank\" rel=\"noreferrer noopener\">First-Time SCADA Penetration Testing<\/a> &#8211; with Ali Dashti<\/li>\n\n\n\n<li><a href=\"https:\/\/youtu.be\/4JOZH1_YnNg?si=XtrHT5L1Muo4qmCD\" target=\"_blank\" rel=\"noreferrer noopener\">OT Cybersecurity Skills: Building Your Expertise<\/a> &#8211; with Shaker Hashlan<\/li>\n\n\n\n<li><a href=\"https:\/\/youtu.be\/8UqXsdhR6dg?si=TCkj3ndhf2eZFX33\">OT 101<\/a> &#8211; with Faisal Albuloushi<\/li>\n\n\n\n<li><a href=\"https:\/\/youtu.be\/33kPa2lLp-I?si=vwciKcgD84lh-Ky7\" target=\"_blank\" rel=\"noreferrer noopener\">Hacking Health: Unveiling Vulnerabilities in Wearable Medical Devices<\/a> &#8211; with Mohammad Al-Hussan<\/li>\n\n\n\n<li><a href=\"https:\/\/youtu.be\/HpW9RdI4oCk?si=q18oWZvK6pW9RjSD\" target=\"_blank\" rel=\"noreferrer noopener\">From OT Security to IIoT<\/a> &#8211; with Shaker Hashlan<\/li>\n\n\n\n<li><a href=\"https:\/\/youtu.be\/4sx3roNNQSU?si=ZtlTdaufLNYZLAZO\" target=\"_blank\" rel=\"noreferrer noopener\">ICS\/OT Blue Team<\/a> &#8211; with Shaker Hashlan<\/li>\n<\/ol>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>English Episodes<\/strong><\/h4>\n\n\n\n<ol class=\"wp-block-list\">\n<li><a href=\"https:\/\/youtu.be\/6aYFdVTc_Qw?si=QeXchr2kNoTbCXSp\" target=\"_blank\" rel=\"noreferrer noopener\">Open Source Zero Trust<\/a> &#8211; with Philip Griffiths<\/li>\n\n\n\n<li><a href=\"https:\/\/youtu.be\/SvElhQRc-DM?si=rZZwfnZLlgSGAJKf\" target=\"_blank\" rel=\"noreferrer noopener\">PLC Scanning: Safe Practice or Security Risk?<\/a> &#8211; with Raphael Arakelian<\/li>\n\n\n\n<li><a href=\"https:\/\/youtu.be\/YeM03K2-qkQ?si=x5BIRjjF7jdk6ObV\" target=\"_blank\" rel=\"noreferrer noopener\">Medical Devices Exposed<\/a> &#8211; with Alessio Rosas<\/li>\n\n\n\n<li><a href=\"https:\/\/youtu.be\/ATx7cYaX6BY?si=vo4FLwGCZ0ObW5VD\" target=\"_blank\" rel=\"noreferrer noopener\">Disaster Recovery in OT<\/a> &#8211; with Saltanat Mashirova<\/li>\n\n\n\n<li><a href=\"https:\/\/youtu.be\/qvbVApz0xPQ?si=Ij7zs97QBtA5PqCv\" target=\"_blank\" rel=\"noreferrer noopener\">OT Penetration Testing<\/a> &#8211; with Mike Holcomb<\/li>\n\n\n\n<li><a href=\"https:\/\/youtu.be\/CXKgocF6qA0?si=JmE119LxRvKXM8FB\">My Interview with Mike Hoffman<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/youtu.be\/uT8hlq1YHlM?si=nAi5zUuw-zGHJMgV\" target=\"_blank\" rel=\"noreferrer noopener\">Interview with Sinclair Koelemij<\/a><\/li>\n<\/ol>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Blog Posts (2024)<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Total Articles: 14<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>OT Hunt Series:<\/strong> 11<\/li>\n<\/ul>\n\n\n\n<p>As usual, my routine involves searching for exposed ICS\/OT devices, continuing my passion for research, and building a profile of <strong>dorks\/filters<\/strong>\u2014the backbone of my tool, <strong><a href=\"https:\/\/www.icsrank.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">ICSrank.com<\/a><\/strong>. Some dorks I share in articles, while others remain unpublished.<\/p>\n\n\n\n<p>One of my standout articles this year was <em><a href=\"https:\/\/zerontek.com\/zt\/2024\/09\/30\/how-to-find-water-systems-on-the-internet-a-guide-to-ics-ot-osint\/\" target=\"_blank\" rel=\"noreferrer noopener\">How to Find Water Systems on the Internet: A Guide to ICS\/OT OSINT<\/a><\/em>. It gained significant traction in the OT community, was published in <em>Security Week Magazine<\/em>, and referenced in a research article by<a href=\"https:\/\/t.co\/bm5QWdsnwm\" target=\"_blank\" rel=\"noreferrer noopener\"> Forescout<\/a>.<\/p>\n\n\n\n<p>Finding the responsible asset owner behind exposed ICS\/OT devices has been a long-standing challenge, but I succeeded in identifying some of these critical systems. I urge everyone to read this article and share it with asset owners, companies, and countries managing critical infrastructure.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Topics include:<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li><a href=\"https:\/\/zerontek.com\/zt\/2024\/02\/04\/find-ics-ot-devices-on-the-internet-with-icsrank\/\" target=\"_blank\" rel=\"noreferrer noopener\">Find ICS\/OT Devices on the Internet with ICSrank<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/zerontek.com\/zt\/2024\/12\/28\/open-source-tools-for-ot-defenders\/\" target=\"_blank\" rel=\"noreferrer noopener\">Open Source Tools for OT Defenders<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/zerontek.com\/zt\/2024\/04\/14\/ot-osint-using-gemini-ai-for-plc-and-hmi-image-analysis\/\" target=\"_blank\" rel=\"noreferrer noopener\">ICS\/OT OSINT: Using Gemini AI for PLC and HMI Image Analysis<\/a><\/li>\n<\/ol>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>OT Hunt Series<\/strong><\/h4>\n\n\n\n<ol class=\"wp-block-list\">\n<li><a href=\"https:\/\/zerontek.com\/zt\/2024\/09\/30\/how-to-find-water-systems-on-the-internet-a-guide-to-ics-ot-osint\/\" target=\"_blank\" rel=\"noreferrer noopener\">How to Find Water Systems on the Internet: A Guide to ICS\/OT OSINT<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/zerontek.com\/zt\/2024\/03\/04\/ot-hunt-finding-hmis-with-shodan\/\" target=\"_blank\" rel=\"noreferrer noopener\">OT Hunt: Finding HMIs with Shodan<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/zerontek.com\/zt\/2024\/03\/18\/ot-hunt-finding-ics-ot-with-censys\/\" target=\"_blank\" rel=\"noreferrer noopener\">OT Hunt: Finding ICS\/OT with Censys<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/zerontek.com\/zt\/2024\/02\/26\/ot-hunt-finding-ics-ot-with-zoomeye\/\" target=\"_blank\" rel=\"noreferrer noopener\">OT Hunt: Finding ICS\/OT with ZoomEye<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/zerontek.com\/zt\/2024\/02\/15\/ot-hunt-finding-ics-ot-with-fofa\/\" target=\"_blank\" rel=\"noreferrer noopener\">OT Hunt: Finding ICS\/OT with FOFA<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/zerontek.com\/zt\/2024\/11\/29\/unveiling-the-risks-of-exposed-t5-plcs-vulnerable-routers-and-rtsp-misconfigurations\/\" target=\"_blank\" rel=\"noreferrer noopener\">Unveiling Risks of Exposed T5 PLCs, Vulnerable Routers, and RTSP Misconfigurations<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/zerontek.com\/zt\/2024\/07\/24\/how-to-find-and-probe-enco-plcs-on-the-internet-just-like-frostygoop-malware\/\" target=\"_blank\" rel=\"noreferrer noopener\">How to Find and Probe ENCO PLCs on the Internet<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/zerontek.com\/zt\/2024\/07\/02\/finding-wago-750-88x-plc-using-google\/\" target=\"_blank\" rel=\"noreferrer noopener\">Finding WAGO 750-88x PLC Using Google<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/zerontek.com\/zt\/2024\/04\/22\/ot-hunt-analyzing-codesys-security-with-mitre-t0886\/\" target=\"_blank\" rel=\"noreferrer noopener\">OT Hunt: Analyzing CODESYS Security with MITRE T0886<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/zerontek.com\/zt\/2024\/10\/25\/html5-in-the-wild-transforming-ot-interfaces-but-opening-new-risks\/\" target=\"_blank\" rel=\"noreferrer noopener\">HTML5 in the Wild: Transforming OT Interfaces but Opening New Risks<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/zerontek.com\/zt\/2024\/08\/19\/ot-hunt-clearscada\/\" target=\"_blank\" rel=\"noreferrer noopener\">OT Hunt: clearSCADA<\/a><\/li>\n<\/ol>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p>For previous summaries, visit:<\/p>\n\n\n\n<p><br><a href=\"https:\/\/zerontek.com\/zt\/2023\/12\/31\/my-journey-through-ics-cybersecurity-in-2023-personal-insights-and-contributions\/\" target=\"_blank\" rel=\"noreferrer noopener\">2023 Summary<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/zerontek.com\/zt\/2022\/12\/31\/ics-summary-2022\/\" target=\"_blank\" rel=\"noreferrer noopener\">2022 Summary<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/zerontek.com\/zt\/2021\/12\/31\/ics-summary-2021\/\" target=\"_blank\" rel=\"noreferrer noopener\">2021 Summary<\/a><\/p>\n\n\n\n<p>Stay safe and inspired.<br><strong>Sulaiman Alhasawi<\/strong><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As 2024 comes to a close, I\u2019m proud to reflect on an incredible year filled with contributions to OT cybersecurity through my blog and ICS Arabia Podcast. This year marked the completion of four years for my blog, and I interviewed 18 guests, surpassing previous years. My guests, a mix of Arabic and English speakers, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1657,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,233,3,177,252,76,168,48],"tags":[7,6,75,169,47,27],"class_list":["post-1633","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","category-ics-arabia","category-ics-security","category-ics-summary","category-ics-ot-osint","category-icsrank","category-ot-hunt","category-ot-security","tag-cyber-security","tag-ics-security","tag-icsrank","tag-ot-hunt","tag-ot-security","tag-zerontek"],"_links":{"self":[{"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/posts\/1633","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/comments?post=1633"}],"version-history":[{"count":24,"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/posts\/1633\/revisions"}],"predecessor-version":[{"id":1658,"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/posts\/1633\/revisions\/1658"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/media\/1657"}],"wp:attachment":[{"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/media?parent=1633"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/categories?post=1633"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/tags?post=1633"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}