In this chapter, we are going to look at a possible attack scenario on an Industrial control system (ICS). The ICS in question controls the process of a paper mill. We will follow along with the activities of the paper mill staff as the attack and infiltration progresses, and along the way, details pertaining the vulnerabilities, exploits, and attacks will be discussed.
The chapter will progress through the following phases:
- Setting the stage.
- The Slumbertown paper mill.
- Trouble in paradise.
- What can the attacker do with their access?
- The cyber kill chain.
- Phase two of the Slumbertown Mill ICS attack.
- Other attack scenarios.