This event has ended. Visit the official site or create your own event on Sched.
Welcome to the interactive agenda for SecurityWeek’s ICS 2022 ICS Cyber Security Conference. Sessions are being finalized and the final program will include 4 FULL DAYS of content. (View the full conference website here) (You can Register for the IN-PERSON Conference and trainings here and register for virtual/online only access here)
Hope II [clear filter]
Monday, October 24

9:00am EDT

Attacking ICS With Python
(Register) This 8-hour workshop will be a crash course in ICS vulnerabilities and exploitation, providing hands-on, practical training in the carrying out of attacks against various common types of ICS equipment found in the field, including an HMI, PLC and automated circuit breaker. Students will learn:
  • Common ICS terminology and system architecture, including inherent flaws and typical mistakes made in system design which should be considered when planning an attack. 
  • Modbus and Modbus/TCP architecture and functionality
  • Python modules for interacting with Modbus-based systems, and writing scripts to interrogate and attack these systems
  • Defensive methodologies and considerations in the face of how simple these attacks can be to carry out
Students should come prepared with the following equipment and knowledge: 
  • A laptop running either Virtualbox, VMWare Workstation (not Player), Parallels, or VMWare Fusion
  • An available Ethernet port on the laptop
  • Ability to read technical documents written in English
  • Experience writing basic Python scripts which incorporate modules and leverage functions and loops
  • Basic Linux command line experience, including the ability to navigate directories, and launch application
Register Here

avatar for Antonio “Johnny” Martinelli

Antonio “Johnny” Martinelli

Director of Training, GRIMM
Johnny is a predominant personality in the Information Security community and is currently the Director of Cybersecurity Training with the Grimm Security Engineering firm. He is most well-known for his work on the American TSA Master Key leaks between 2014 and 2018 and the Venmo public... Read More →
avatar for Cole Smith

Cole Smith

After finishing his Bachelor's in Cybersecurity at George Washington University, ColeSmith started as a Junior Cyber Physical Engineer at GRIMM. Prior to that, he spent four years in the United States Marine Corps working with field utilities as an electrician/generator mechanic... Read More →

Monday October 24, 2022 9:00am - 5:00pm EDT
Hope II
Filter sessions
Apply filters to sessions.