Advanced Metering Infrastructure Attack Methodology Document - - PowerPoint PPT Presentation

advanced metering infrastructure attack methodology
SMART_READER_LITE
LIVE PREVIEW

Advanced Metering Infrastructure Attack Methodology Document - - PowerPoint PPT Presentation

Advanced Metering Infrastructure Attack Methodology Document Matthew Carpenter ASAP Red Team Lead matt@inguardians.com Introduction to Attack Methodology Guide for consistent testing Authors: Matthew Carpenter Travis


slide-1
SLIDE 1

Advanced Metering Infrastructure Attack Methodology Document

Matthew Carpenter ASAP Red Team Lead matt@inguardians.com

slide-2
SLIDE 2

Introduction to Attack Methodology

  • Guide for consistent testing
  • Authors:

– Matthew Carpenter – Travis Goodspeed – Joshua Wright

  • Editing and Technical Review:

– Bradley Singletary – Ed Skoudis

slide-3
SLIDE 3

Target Audience

  • Utilities and Vendors

– Security Teams – Internal Attack Teams – Management

  • Third-Party Analysis Teams
slide-4
SLIDE 4

Purpose and Scope

  • Purpose:

– Consistent Testing Between Different Architectures – Assist Utilities in Testing Their Own Systems – Help Vendors Prepare

  • Scope: Attacking Embedded Equipment

– Meters and Support Architecture

  • Not on the Utility Premise

– Not in scope: Utility Premise Systems

– ERP – MDUS – SCADA – Head-Ends

slide-5
SLIDE 5

Document Overview

  • Principles of AMI Vulnerability Assessments

– Instructing Testing Team – Quality Assessment Principles

  • Lab Construction

– Key equipment we will use to test

  • Vulnerability Types

– Specific vulnerabilities we will be looking for

  • Actual vulnerabilities found may not be in this list
  • Attack Methodology
slide-6
SLIDE 6

Attack Methodology

  • Reconnaissance

– Information Gathering

  • Identifying system components (mcus, eeproms, etc…)
  • Researching network infrastructure
  • Initial Analysis

– Shallow analysis of target device(s)

  • Fully assess key areas of interest
  • Deep Analysis

– Areas of interest as identified during Initial Analysis

  • Exploitation

– Combining “Possibilities” together to form Attacks

slide-7
SLIDE 7

Got Vulns?

  • Testing begins very soon...

– Coming to a lab near you!

slide-8
SLIDE 8

matt@inguardians.com AMI-SEC Collaboration Site http://osgug.ucaiug.org/utilisec/amisec

Questions? Discussion?