sixnet-tools Logo

sixnet-tools

0
Free
Visit Website

Tool for exploiting Sixnet RTUs. Abstract: Supervisory Control and Data Acquisition (SCADA) networks and devices are the computational brains behind the nation’s infrastructure. They monitor and control industrial machinery in power plants, oil and gas lines, assembly lines, and etcetera. There exist programmable logic controllers and remote terminal units sitting on these SCADA networks that are critically lacking in some of the most basic security processes and controls. This paper and the corresponding project are meant to highlight such a weakness at the application level of Sixnet SCADA devices. The tool detailed in this project is written in Python and allows an attacker to gain root level access to these Sixnet devices with very little effort. The Project: There are three aspects to a basic SCADA network. The network itself is the medium through which the endpoints communicate with each other. These networks are very similar to corporate local area or wide area networks and may consist of various routing and switching components. Ideally a SCADA network is a completely isolated subnet of a greater corporate network and out of reach of the internet. Another aspe

FEATURES

ALTERNATIVES

A lightweight, first-stage C2 implant written in Nim for remote access and control.

A free, safe, and legal training ground for ethical hackers to test and expand their skills

Participation in the Red Team for Pacific Rim CCDC 2017 with insights on infrastructure design and competition tips.

A PoC tool for generating Excel files with embedded macros without using Excel.

A penetration testing framework for identifying and exploiting vulnerabilities.

A tool for working with Direct System Calls in Cobalt Strike's Beacon Object Files (BOF) for offensive security purposes.

A specification/framework for extending default C2 communication channels in Cobalt Strike

Generates randomized C2 profiles for Cobalt Strike to evade detection.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved