{"id":576,"date":"2021-12-31T11:56:48","date_gmt":"2021-12-31T08:56:48","guid":{"rendered":"https:\/\/zerontek.com\/zt\/?p=576"},"modified":"2021-12-31T11:56:48","modified_gmt":"2021-12-31T08:56:48","slug":"ics-summary-2021","status":"publish","type":"post","link":"https:\/\/zerontek.com\/zt\/2021\/12\/31\/ics-summary-2021\/","title":{"rendered":"ICS summary 2021"},"content":{"rendered":"\n<p>Today is the last day in 2021 and it&#8217;s been  a wonderful year participating in the ICS world and community. For that I thought I would like to summarize all my articles that I wrote in 2021,  extract the lessons and plan for future directions. I have categorized my articles into 4 categories based on what I wrote. I plan to update those categories with more content and also include new categories as I continue to write new topics. I wish every one success, health and happiness.  <\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">ICS technical skills<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>ICS IR skills <strong>&#8220;ICS Cyber Incident Response&#8221;<\/strong>:<a rel=\"noreferrer noopener\" href=\"https:\/\/zerontek.com\/zt\/2021\/12\/05\/ics-cyber-incident-response\/\" target=\"_blank\">https:\/\/zerontek.com\/zt\/2021\/12\/05\/ics-cyber-incident-response\/<\/a><\/li><li>ICS monitoring skills <strong>&#8220;Tips &amp; Tricks 1: What to monitor in ICS ?&#8221;<\/strong>:<a rel=\"noreferrer noopener\" href=\"https:\/\/zerontek.com\/zt\/2021\/02\/03\/tips-tricks-1-what-to-monitor-in-ics\/\" target=\"_blank\">https:\/\/zerontek.com\/zt\/2021\/02\/03\/tips-tricks-1-what-to-monitor-in-ics\/<\/a><\/li><li>ICS asset identification skills <strong>&#8220;Tips &amp; Tricks 2: Asset Identification&#8221;<\/strong>:<a rel=\"noreferrer noopener\" href=\"https:\/\/zerontek.com\/zt\/2021\/02\/20\/tips-tricks-2-asset-identification\/\" target=\"_blank\">https:\/\/zerontek.com\/zt\/2021\/02\/20\/tips-tricks-2-asset-identification\/<\/a><\/li><li>ICS zones skills <strong>&#8220;Tips &amp; Tricks 3 How to assess the security of your ICS architecture ?&#8221;<\/strong>:<a href=\"https:\/\/zerontek.com\/zt\/2021\/02\/28\/tips-tricks-3-how-to-assess-the-security-of-your-ics-architecture\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/zerontek.com\/zt\/2021\/02\/28\/tips-tricks-3-how-to-assess-the-security-of-your-ics-architecture\/<\/a><\/li><li>ICS with Wireshark skills <strong>&#8220;Wireshark: BACnet security analysis&#8221;<\/strong>:<a href=\"https:\/\/zerontek.com\/zt\/2021\/05\/25\/wireshark-bacnet-security-analysis\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/zerontek.com\/zt\/2021\/05\/25\/wireshark-bacnet-security-analysis\/<\/a><\/li><\/ul>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">ICS tools:<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>&#8220;Metasploit Modules for ICS&#8221;<\/strong>:<a href=\"https:\/\/zerontek.com\/zt\/2021\/03\/10\/m\" target=\"_blank\" rel=\"noreferrer noopener\">htt<\/a><a href=\"https:\/\/zerontek.com\/zt\/2021\/03\/10\/m\">ps:\/\/zerontek.com\/zt\/2021\/03\/10\/metasploit-modules-for-ics\/<\/a><\/li><li><strong>&#8220;Wireshark filters for ICS protocols&#8221;<\/strong>:<a href=\"https:\/\/zerontek.com\/zt\/2021\/04\/12\/wireshark-filters-for-ics-protocols\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/zerontek.com\/zt\/2021\/04\/12\/wireshark-filters-for-ics-protocols\/<\/a><\/li><li><strong>&#8220;ICS files in Exploit Database&#8221;<\/strong>:<a href=\"https:\/\/zerontek.com\/zt\/2021\/03\/28\/ics-files-in-exploit-database\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/zerontek.com\/zt\/2021\/03\/28\/ics-files-in-exploit-database\/<\/a><\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Future ideas and research (POC):<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>A framework [ICSRank] I developed to reduce ICS risks<strong>&#8220;Reduce your OT risk&#8221;<\/strong>:<a rel=\"noreferrer noopener\" href=\"https:\/\/zerontek.com\/zt\/2021\/10\/14\/reduce-your-ot-risk\/\" target=\"_blank\">https:\/\/zerontek.com\/zt\/2021\/10\/14\/reduce-your-ot-risk\/<\/a><\/li><li>Some brainstorming ideas to fix the ICS patching issues<strong>&#8220;ICS patching without<\/strong> <strong>rebooting&#8221;:<\/strong><a rel=\"noreferrer noopener\" href=\"https:\/\/zerontek.com\/zt\/2021\/11\/18\/ics-patching-without-rebooting\/\" target=\"_blank\">https:\/\/zerontek.com\/zt\/2021\/11\/18\/ics-patching-without-rebooting\/<\/a><\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">ICS attacks, incidents and statistics: <\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>A report that analyzes the status of ICS exploits in the market&#8221;<strong>ICS\/OT Exploits<\/strong>&#8220;: <a rel=\"noreferrer noopener\" href=\"https:\/\/zerontek.com\/zt\/2021\/08\/10\/ics-ot-exploits\/\" target=\"_blank\">https:\/\/zerontek.com\/zt\/2021\/08\/10\/ics-ot-exploits\/<\/a><\/li><li>An analysis of the recent Iranian attack&#8221;<strong>Iranian Gas Cyberattack<\/strong>&#8220;:<a rel=\"noreferrer noopener\" href=\"https:\/\/zerontek.com\/zt\/2021\/10\/31\/iranian-gas-cyberattack\/\" target=\"_blank\">https:\/\/zerontek.com\/zt\/2021\/10\/31\/iranian-gas-cyberattack\/<\/a><\/li><li>An article that analyzes the behavior of ICS asset owners based on Shodan&#8221;<strong>How ICS owners think<\/strong>&#8220;:<a rel=\"noreferrer noopener\" href=\"https:\/\/zerontek.com\/zt\/2021\/01\/07\/how-ics-owners-think\/\" target=\"_blank\">https:\/\/zerontek.com\/zt\/2021\/01\/07\/how-ics-owners-think\/<\/a><\/li><li>Lessons learned from the 2020-2021 attacks on water systems&#8221;<strong>Hacking Water Exposed<\/strong>&#8220;:<a rel=\"noreferrer noopener\" href=\"https:\/\/zerontek.com\/zt\/2021\/07\/14\/hacking-water-exposed\/\" target=\"_blank\">https:\/\/zerontek.com\/zt\/2021\/07\/14\/hacking-water-exposed\/<\/a><\/li><li>A taxonomy developed by myself on how to attack safety PLC systems for gas plants&#8221;<strong>Gas (LPG) Attack<\/strong> <strong>Taxonomy<\/strong>&#8220;:<a rel=\"noreferrer noopener\" href=\"https:\/\/zerontek.com\/zt\/2021\/07\/29\/gas-lpg-attack-taxonomy\/\" target=\"_blank\">https:\/\/zerontek.com\/zt\/2021\/07\/29\/gas-lpg-attack-taxonomy\/<\/a><\/li><\/ul>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today is the last day in 2021 and it&#8217;s been a wonderful year participating in the ICS world and community. For that I thought I would like to summarize all my articles that I wrote in 2021, extract the lessons and plan for future directions. I have categorized my articles into 4 categories based on [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[30,4,41,62,92,45,3,46,76,37,48,88,67,31,77,33,23,78,24,5,32,57,49],"tags":[28,7,13,6,101,102,12,47,20,100,27],"class_list":["post-576","post","type-post","status-publish","format-standard","hentry","category-asset-identification","category-cyber-security","category-exploit-database","category-gas","category-ics-incident-response","category-ics-protocols","category-ics-security","category-ics-tools","category-icsrank","category-metasploit","category-ot-security","category-patching","category-plc","category-risk-assessment","category-sbom","category-security-zones","category-shodan","category-supply-chain","category-tips-tricks","category-vendors","category-vulnerability-assessment","category-water","category-wireshark","tag-asset-identification","tag-cyber-security","tag-ics","tag-ics-security","tag-kuwait-ics","tag-kuwait-ot","tag-ot","tag-ot-security","tag-shodan","tag-sulaiman-alhasawi","tag-zerontek"],"_links":{"self":[{"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/posts\/576","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/comments?post=576"}],"version-history":[{"count":19,"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/posts\/576\/revisions"}],"predecessor-version":[{"id":597,"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/posts\/576\/revisions\/597"}],"wp:attachment":[{"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/media?parent=576"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/categories?post=576"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zerontek.com\/zt\/wp-json\/wp\/v2\/tags?post=576"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}