Skip to content

Basic ransomware implementations in Python for the purpose of testing ICS security.

Notifications You must be signed in to change notification settings

im-jking/TestbedExploits

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

36 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Virtual Testbed Exploits for Evaluation

Basic ICS ransomware implementations in Python for the purpose of testing systems security.

The folder "BasicRansom" contains an exfiltration/encryption reverse shell for testing on HMI systems.

The folder "PyModbus" contains two exploits for Modbus vulnerabilities:

  • "actuatorState" demonstrates an actuator state injection via a MitM attack.

  • "setpointMod" demonstrates an alarm setpoint modification via external access.

  • "Basics" contains the fundamental Modbus client/server program used for both exploits.

All test exploits were executed on a virtual testbed that utilizes VirtualBox to simulate an ICS environment.

About

Basic ransomware implementations in Python for the purpose of testing ICS security.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published