In this on-demand video, you'll explore how attackers use common open-source tools against two of Siemens’ most widely deployed industrial controllers:
Step 1: Reconnaissance
🔎 Discover industrial devices with tools like Netdiscover, Nmap, NSE, and SNMPcheck
🔎 Learn how a basic scan reveals critical details about device configuration, firmware, and network posture
Step 2: Unauthorized Interaction
⚙️ Use open-source tools to change CPU operating modes remotely
⚙️ Explore the risk of web servers with insecure CPU control functions
⚙️ Understand the impact on process safety and availability
Step 3: Limitations of Tools & the Bigger Picture
🧠 See what open-source tools can’t do — and why misconfigurations still dominate industrial risk
🧠 Get a realistic view of attacker limitations, and how bad setups make things worse