Our team provides the consulting on SCADA and Industrial Control System. We have more than 10 years of cyber security experience and the main objective of SCADA consulting is to build up client’s advanced cyber defence capabilities through active monitoring, test lab, live exploration and hacking simulation.
Some of critical infrastructures are often connected to external network or there are some access points even though that infrastructures have air-gap. It is important to test all the attack points in the ICS/SCADA because anyone cannot make sure until before performing the penetration test. All testing phases will be coordinated to minimize any adverse impact that may occur as a result of the testing. NSHC’s consultants will take precautions to minimize the negative impact on the systems such as service interruptions and/or data corruption. The test will follow the following workflow.
We are testing all the system devices from business zone to field and control zone that ICS system including control system, HMIs, PLCs, sensors, and etc. We have found 288 vulnerabilities of ICS/SCADA and IoT devices as well.
- Vulnerability Assessment and Penetration Testing on ICS/SCADA Field Devices and Network
- Wireless Penetration Testing
- Compromise Assessment
- Network Architecture and Isolation Review
- DDoS Simulation
- Watering Hole Attack Simulation
- Physical Hacking