sixnet-tools Logo

sixnet-tools

0
Free
Visit Website

Tool for exploiting Sixnet RTUs. Abstract: Supervisory Control and Data Acquisition (SCADA) networks and devices are the computational brains behind the nation’s infrastructure. They monitor and control industrial machinery in power plants, oil and gas lines, assembly lines, and etcetera. There exist programmable logic controllers and remote terminal units sitting on these SCADA networks that are critically lacking in some of the most basic security processes and controls. This paper and the corresponding project are meant to highlight such a weakness at the application level of Sixnet SCADA devices. The tool detailed in this project is written in Python and allows an attacker to gain root level access to these Sixnet devices with very little effort. The Project: There are three aspects to a basic SCADA network. The network itself is the medium through which the endpoints communicate with each other. These networks are very similar to corporate local area or wide area networks and may consist of various routing and switching components. Ideally a SCADA network is a completely isolated subnet of a greater corporate network and out of reach of the internet. Another aspe

FEATURES

ALTERNATIVES

OWASP OWTF is a penetration testing framework focused on efficiency and alignment with security standards.

A tool for interacting with Exchange servers remotely and exploiting client-side Outlook features.

A lightweight and portable Docker container for penetration testers and CTF players

Create a vulnerable active directory for testing various Active Directory attacks.

A C2 front flow control tool designed to evade detection by Blue Teams, AVs, and EDRs.

A tool for iOS pentesting and research with a GUI version available.

Using Apache mod_rewrite as a redirector to filter C2 traffic for Cobalt Strike servers.

A lightweight, first-stage C2 implant written in Nim for remote access and control.