advanced metering infrastructure attack methodology
play

Advanced Metering Infrastructure Attack Methodology Document - PowerPoint PPT Presentation

Advanced Metering Infrastructure Attack Methodology Document Matthew Carpenter ASAP Red Team Lead matt@inguardians.com Introduction to Attack Methodology Guide for consistent testing Authors: Matthew Carpenter Travis


  1. Advanced Metering Infrastructure Attack Methodology Document Matthew Carpenter ASAP Red Team Lead matt@inguardians.com

  2. Introduction to Attack Methodology • Guide for consistent testing • Authors: – Matthew Carpenter – Travis Goodspeed – Joshua Wright • Editing and Technical Review: – Bradley Singletary – Ed Skoudis

  3. Target Audience • Utilities and Vendors – Security Teams – Internal Attack Teams – Management • Third-Party Analysis Teams

  4. Purpose and Scope • Purpose: – Consistent Testing Between Different Architectures – Assist Utilities in Testing Their Own Systems – Help Vendors Prepare • Scope: Attacking Embedded Equipment – Meters and Support Architecture • Not on the Utility Premise – Not in scope: Utility Premise Systems – ERP – MDUS – SCADA – Head-Ends

  5. Document Overview • Principles of AMI Vulnerability Assessments – Instructing Testing Team – Quality Assessment Principles • Lab Construction – Key equipment we will use to test • Vulnerability Types – Specific vulnerabilities we will be looking for • Actual vulnerabilities found may not be in this list • Attack Methodology

  6. Attack Methodology • Reconnaissance – Information Gathering • Identifying system components (mcus, eeproms, etc…) • Researching network infrastructure • Initial Analysis – Shallow analysis of target device(s) • Fully assess key areas of interest • Deep Analysis – Areas of interest as identified during Initial Analysis • Exploitation – Combining “Possibilities” together to form Attacks

  7. Testing begins very soon... – Coming to a lab near you! Got Vulns? •

  8. Questions? Discussion? matt@inguardians.com AMI-SEC Collaboration Site http://osgug.ucaiug.org/utilisec/amisec

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend