Skip to content

Latest commit

 

History

History
28 lines (23 loc) · 1.75 KB

README.md

File metadata and controls

28 lines (23 loc) · 1.75 KB

Detection Training - Basic

In this training, we focus on how to detect network scanning activities using PCAP (Packet Capture) data. PCAP files capture the raw network traffic data and are valuable for the security operation center (SOC) or forensic analysis of network communications.

Attackers use different types of network scanning techniques to map out the network and gather intelligence. Common techniques include:

  1. Ping Sweep:
    • Attackers send ICMP Echo Requests to multiple IP addresses to determine which hosts are online.
  2. Port Scanning:
    • Tools like Nmap are used to scan for open ports on target systems. Common scan types include:
      • SYN scan (Half-Open Scan): Sends SYN packets to check if a port is open.
      • TCP Connect Scan: Establishes a full TCP connection with the target port.
      • UDP Scan: Tests for open UDP ports, commonly used on industrial protocols like Modbus (port 502).
      • Service Detection: Queries services running on open ports to determine their versions (e.g., OPC UA on port 4840).
  3. Application Layer Scanning:
    • Attackers scan for specific application protocols such as Modbus, DNP3, or OPC UA by probing for industrial control protocols that indicate system roles.

Detecting and mitigating network scanning on industrial systems is a critical first step in preventing cyberattacks. By capturing and analyzing network traffic through PCAP files, security teams can identify early signs of an attack and take appropriate action before an adversary gains deeper access to the system.

Which ports do the attacker scan? Which ports are open, and which are closed?

Solution