For the LICSTER testbed, we provide some basic attack examples, to understand the impacts of ICS attacks.
hping3 is common tool to send custom TCP/IP packets. In this scenario, it is used for DoS/flooding attacks.
Flooding of the Remote IOs:
sudo hping3 --flood 192.168.0.51
sudo hping3 --flood 192.168.0.52
Flooding of the PLC:
sudo hping3 --flood 192.168.0.30
Flooding of the HMI:
sudo hping3 --flood 192.168.0.20
Flooding of the SCADA system:
sudo hping3 --flood 192.168.0.10
This scenarios will demonstrate, how the convey belt could b inflamed. For this, start a regular order on the HMI. After this, the attack can be started:
sudo ./conveyer_belt.py
The convey belt should stop, after the punching process.
Start python with the corresponding LICSTER client:
python3 -i client.py
>>>
E.g. execute an order over python:
setOrder(1)
The default IP of the TP-Link switch is http://192.168.0.1/. Set the mirror port on PORT 8 and activate mirroring from PORT 1-7. After this, you can connect to PORT 8 and will see all network traffic of the testbed.