In Part 7, we take a small break from the critical controls in securing our ICS/OT networks to play ICS/OT attacker!
In this section, we will cover main topics including, but not limited to:
- What is Open Source Intelligence (OSINT) Gathering?
- Create Custom Google Searches Specific to ICS/OT
- Reverse Engineering the NSA’s ELITEWOLF Project
- Understanding How WHOIS & DNS Work
- Look at Using Digital Certificates to Find ICS/OT Assets
- Risk Associated with Posting on Social Media
- What Can We Find As Attackers on LinkedIn and Other Sites?
- Finding Industrial Control Systems with Shodan
If you like the content, please consider Liking the video and subscribing!
Thank you for checking it out!
![](https://i.ytimg.com/vi/5W2VgVVkxrc/maxresdefault.jpg)