Event banner

Labs Live: Operational Technology

Tuesday, Jul 15, 2025, 07:00 AM PDT
Online

Event details

Ever felt totally stuck with a lab?

Getting frustrated?

Maybe you could have used the helpful guidance of an expert?

Join our Labs Live webinar, a groundbreaking community webinar series from Immersive!

We're bringing you live, interactive lab sessions led by seasoned professionals. In each Labs Live webinar, you'll collaborate directly with an expert as they navigate a challenging lab.

They'll share their techniques, answer your questions, and together, you might even discover new insights. This isn't just a demonstration; it's a hands-on learning experience.Don't miss out on this unique opportunity to elevate your cyber skills.

This Labs Live session will be hosted by SamMaesschalck​, Lead Cyber Security Engineer, as he tackles one of our new Operational Technology labs.

Register your attendance now by hitting "Attend"!

KieranRowley
Published 21 days ago

1 Comment

  • For this Labs Live, I'll be guiding you through the ICS Vulnerabilities: Protocol Injection lab. 

    ICS Vulnerabilities: Protocol Injection
    Difficulty 6 - Practical

    Incident responders and SOC analysts working in OT and ICS environments must know the unique challenges of protocol attacks targeting these systems. These attacks exploit the inherent vulnerabilities in various OT and ICS communication protocols, with potentially disastrous consequences for the target organization. This lab provides an overview of protocol attacks, discusses specific examples of such attacks, and outlines detection and prevention strategies.

    Understanding these attacks is critically important because many of the industrial protocols in use today, such as Modbus, DNP3, and S7Comm, were designed decades ago, long before cybersecurity was a concern. As a result, these protocols often lack basic security features like encryption and authentication, making them especially vulnerable to manipulation.

    Protocol injection attacks can allow adversaries to issue unauthorized commands to industrial devices, change setpoints, toggle coils or relays, and ultimately alter physical processes. In real-world environments, this could mean anything from stopping a production line to causing unsafe operating conditions, damaging equipment, or even endangering human lives. Because these protocols typically assume trust in the network, even a limited foothold can give attackers significant control over critical infrastructure.

    Throughout this Labs Live session, I'll highlight the nuances and impacts of these attacks and explain why they might not be as straightforward as they seem.

Date and Time
Jul 15, 20257:00 AM - 7:45 AM PDT