Other References and Auxiliary Stuff

This project aims at emulating OT setup of a lab and simulate various cyber attacks.

Other References and Auxiliary Stuff

Detailed Documentation for Softwares and Protocols Used

Research Papers

Articles & Documents

Data Visualisation and Logging Software

  • Prometheus - Open source metrics and monitoring for your systems and services
  • Grafana - Monitoring system (seems to be advanced and famous)
  • Kibana

Primary Usage

Tools Used | Explore them

  • Wireshark: For network traffic analysis during attack simulations.
  • Metasploit: For simulating cyberattacks.
  • Ghidra: For analyzing and debugging security vulnerabilities in the system.

Glossary

  • MITM (Man-in-the-Middle): An attack where an attacker intercepts and potentially alters communication between two parties.
  • OPC UA: Open Platform Communications Unified Architecture, a protocol used for secure data exchange in industrial control systems.
  • PLC: Programmable Logic Controller, used in industrial automation for controlling machines and processes.