{"id":118,"date":"2016-07-17T23:29:15","date_gmt":"2016-07-17T23:29:15","guid":{"rendered":"http:\/\/www.samuelhuntley.com\/?p=118"},"modified":"2016-11-03T02:53:12","modified_gmt":"2016-11-03T02:53:12","slug":"hacking-scadaindustrial-control-systems-the-pentest-guide","status":"publish","type":"post","link":"https:\/\/www.samuelhuntley.com\/?p=118","title":{"rendered":"Hacking SCADA\/Industrial Control Systems: The Pentest Guide"},"content":{"rendered":"<p>The book delves into specific details and methodology of how to perform secuity assessments against the SCADA and Industrial control systems. The goal of this book is to provide a roadmap to the security assessors such as security analysts, pentesters, security architects, etc. and use the existing techniques that they are aware about and apply them to perform security asessments against the SCADA world. The book shows that the same techniques used to assess IT environments can be used for assessing the efficacy of defenses that protect the ICS\/SCADA systems as well.<\/p>\n<p><a href=\"http:\/\/www.samuelhuntley.com\/wp-content\/uploads\/2016\/07\/scada.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-120\" src=\"http:\/\/www.samuelhuntley.com\/wp-content\/uploads\/2016\/07\/scada-232x300.png\" alt=\"scada\" width=\"232\" height=\"300\" srcset=\"https:\/\/www.samuelhuntley.com\/wp-content\/uploads\/2016\/07\/scada-232x300.png 232w, https:\/\/www.samuelhuntley.com\/wp-content\/uploads\/2016\/07\/scada.png 296w\" sizes=\"(max-width: 232px) 100vw, 232px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/www.amazon.com\/Hacking-SCADA-Industrial-Control-Systems\/dp\/1533022062\">Buy it at Amazon<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The book delves into specific details and methodology of how to perform secuity assessments against the SCADA and Industrial control systems. The goal of this book is to provide a roadmap to the security assessors such as security analysts, pentesters, security architects, etc. and use the existing techniques that they are aware about and apply &hellip; <a href=\"https:\/\/www.samuelhuntley.com\/?p=118\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Hacking SCADA\/Industrial Control Systems: The Pentest Guide<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"_links":{"self":[{"href":"https:\/\/www.samuelhuntley.com\/index.php?rest_route=\/wp\/v2\/posts\/118"}],"collection":[{"href":"https:\/\/www.samuelhuntley.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.samuelhuntley.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.samuelhuntley.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.samuelhuntley.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=118"}],"version-history":[{"count":2,"href":"https:\/\/www.samuelhuntley.com\/index.php?rest_route=\/wp\/v2\/posts\/118\/revisions"}],"predecessor-version":[{"id":121,"href":"https:\/\/www.samuelhuntley.com\/index.php?rest_route=\/wp\/v2\/posts\/118\/revisions\/121"}],"wp:attachment":[{"href":"https:\/\/www.samuelhuntley.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=118"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.samuelhuntley.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=118"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.samuelhuntley.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=118"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}