YoVDO

Scarlet OT - Adversary Emulation for Operational Technology

Offered By: Ekoparty Security Conference via YouTube

Tags

Industrial Control Systems Courses Cybersecurity Courses Penetration Testing Courses Malware Analysis Courses Network Traffic Analysis Courses Adversary Emulation Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore an innovative approach to OT adversary emulation in this 45-minute conference talk from Ekoparty 2023. Delve into the development of Scarlet OT, an open-source tool designed as a plugin for MITRE's Caldera framework. Learn how this solution addresses the challenges of ICS security testing by enabling users to combine IT attacks with OT adversaries, modify attack steps, and send manual commands. Discover insights gained from analyzing factory traffic and 19 MITRE-defined ICS malwares, including the evolution of ICS malware trends and a four-stage attacking flow. Gain an understanding of Scarlet OT's capabilities, supporting 10 common protocols and over 23 techniques on the MITRE ICS matrix, allowing reproduction of more than 80% of defined ICS malware actions. Witness a live demonstration and learn about the tool's successful testing on real industrial devices across various sectors. Speaker Vic Huang, known for his expertise in Web/Mobile/Blockchain Security and penetration testing, shares valuable insights from his research presented at numerous security conferences.

Syllabus

Scarlet OT – OT adversary emulation for fun and profit - Vic Huang - Ekoparty 2023


Taught by

Ekoparty Security Conference

Related Courses

Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Palo Alto Networks Cybersecurity Essentials II
Palo Alto Networks via Coursera
Introducción al Análisis del Malware en Windows
National Technological University – Buenos Aires Regional Faculty via Miríadax
Android Malware Analysis - From Zero to Hero
Udemy
How to Create and Embed Malware (2-in-1 Course)
Udemy