sixnet-tools Logo

sixnet-tools

0
Free
Visit Website

Tool for exploiting Sixnet RTUs. Abstract: Supervisory Control and Data Acquisition (SCADA) networks and devices are the computational brains behind the nation’s infrastructure. They monitor and control industrial machinery in power plants, oil and gas lines, assembly lines, and etcetera. There exist programmable logic controllers and remote terminal units sitting on these SCADA networks that are critically lacking in some of the most basic security processes and controls. This paper and the corresponding project are meant to highlight such a weakness at the application level of Sixnet SCADA devices. The tool detailed in this project is written in Python and allows an attacker to gain root level access to these Sixnet devices with very little effort. The Project: There are three aspects to a basic SCADA network. The network itself is the medium through which the endpoints communicate with each other. These networks are very similar to corporate local area or wide area networks and may consist of various routing and switching components. Ideally a SCADA network is a completely isolated subnet of a greater corporate network and out of reach of the internet. Another aspe

FEATURES

ALTERNATIVES

A blog post discussing the often overlooked dangers of CSV injection in applications.

Kali Linux is a specialized Linux distribution for cybersecurity professionals, focusing on penetration testing and security auditing.

A Go client to communicate with Chaos DB API

A free and open source C2 and proxy for penetration testers

A tool for enumerating and attacking GitHub Actions pipelines

A tool for automated security scanning of web applications and manual penetration testing.

Maintaining account persistence via XSS and Oauth

SauronEye helps in identifying files containing sensitive data such as passwords through targeted directory searches.

PINNED