0
0
SCADA systemsdevops~20 mins

Common SCADA vulnerabilities in SCADA systems - Practice Problems & Coding Challenges

Choose your learning style9 modes available
Challenge - 5 Problems
🎖️
SCADA Security Master
Get all challenges correct to earn this badge!
Test your skills under time pressure!
🧠 Conceptual
intermediate
2:00remaining
Identify the most common vulnerability in SCADA systems

Which of the following is the most common vulnerability found in SCADA systems that can lead to unauthorized access?

AStrict network segmentation
BExcessive encryption of communication channels
COveruse of multi-factor authentication
DUse of default or weak passwords on devices
Attempts:
2 left
💡 Hint

Think about what attackers often exploit first when targeting SCADA devices.

💻 Command Output
intermediate
2:00remaining
Output of a network scan on a SCADA device

You run a network scan on a SCADA device using the command nmap -sV 192.168.1.100. Which output indicates a vulnerable service running?

SCADA systems
Starting Nmap 7.80 ( https://nmap.org ) at 2024-06-01 10:00
Nmap scan report for 192.168.1.100
Host is up (0.0010s latency).
Not shown: 997 closed ports
PORT     STATE SERVICE VERSION
502/tcp  open  modbus  Modbus protocol
80/tcp   open  http    Apache httpd 2.2.15
23/tcp   open  telnet  Linux telnetd

Service Info: OS: Linux
ATelnet service running on port 23
BModbus protocol running on port 502
CApache httpd 2.2.15 running on port 80
DAll services are secure and up to date
Attempts:
2 left
💡 Hint

Consider which service is known for transmitting data without encryption.

Troubleshoot
advanced
2:00remaining
Troubleshoot SCADA system communication failure

A SCADA system suddenly stops communicating with remote RTUs (Remote Terminal Units). Which configuration issue is the most likely cause?

ARTUs configured with static IP addresses
BFirewall blocking Modbus TCP port 502
CUse of encrypted VPN tunnels between SCADA and RTUs
DRTUs running latest firmware
Attempts:
2 left
💡 Hint

Think about what could block the communication protocol used by SCADA.

Best Practice
advanced
2:00remaining
Best practice to secure SCADA communication

Which of the following is the best practice to secure communication between SCADA control centers and field devices?

ADisable all authentication to speed up communication
BAllow direct internet access to SCADA devices for remote management
CUse VPN tunnels with strong encryption for all SCADA traffic
DUse default passwords to simplify device access
Attempts:
2 left
💡 Hint

Think about how to protect data traveling over networks.

🔀 Workflow
expert
3:00remaining
Order the steps to respond to a SCADA malware infection

Arrange the following steps in the correct order to respond effectively to a malware infection in a SCADA system.

A1,3,2,4
B3,1,2,4
C1,2,3,4
D3,2,1,4
Attempts:
2 left
💡 Hint

Think about immediate containment before analysis and recovery.