Summary
We have covered a lot of ground in this chapter. We discussed various methods of active security monitoring and got our hands dirty with some common tools and scanning techniques. We looked at ways to discover vulnerabilities and how to scan for known misconfigurations and other issues on our ICS network.
Between the techniques and tools we discussed in the previous chapter and this one, we have captured a boatload of security-related information. In the next chapter, we will discuss ways to store, retrieve, search, correlate, and present all this information.