View Issue Details
ID | Project | Category | View Status | Date Submitted | Last Update |
---|---|---|---|---|---|
0003056 | Kali Linux | New Tool Requests | public | 2016-02-10 11:54 | 2020-02-11 12:17 |
Reporter | enddo | Assigned To | |||
Priority | normal | Severity | feature | Reproducibility | sometimes |
Status | closed | Resolution | won't fix | ||
Summary | 0003056: SMOD (MODBUS Penetration Testing Framework) | ||||
Description | SMOD is a modular framework with every kind of diagnostic and offensive feature you could need in order to pentest modbus protocol. It is a full Modbus protocol implementation using Python and Scapy. This software could be run on Linux/OSX under python 2.7.x. SCADA (Process Control Networks) based systems have moved from proprietary closed networks to open source solutions and TCP/IP enabled networks steadily over recent years. This has made them vulnerable to the same security vulnerabilities that face our traditional computer networks. The Modbus/TCP protocol was used as the reference protocol to display the effectiveness of the test bed in carrying out cyber attacks on a power system protocol. Modbus/TCP was chosen specifically for these reasons:
You can use this tool to vulnerability assessment a modbus protocol. | ||||
To help speed up the process of evaluating the tool, please make sure to include the following information (the more information you include, the more beneficial it will for us):
|
|
Project now 404's |
|
Date Modified | Username | Field | Change |
---|---|---|---|
2016-02-10 11:54 | enddo | New Issue | |
2018-01-29 14:24 | g0tmi1k | Summary | Request SMOD(MODBUS Penetration Testing Framework) => SMOD (MODBUS Penetration Testing Framework) |
2018-01-29 15:14 | g0tmi1k | Note Added: 0008477 | |
2020-02-11 12:17 | g0tmi1k | Note Added: 0012227 | |
2020-02-11 12:17 | g0tmi1k | Status | new => closed |
2020-02-11 12:17 | g0tmi1k | Resolution | open => won't fix |