{"id":510,"date":"2023-11-04T22:15:37","date_gmt":"2023-11-04T14:15:37","guid":{"rendered":"http:\/\/ai.gitpp.com\/?p=510"},"modified":"2023-11-08T16:39:36","modified_gmt":"2023-11-08T08:39:36","slug":"%e5%b7%a5%e4%b8%9a%e9%a2%86%e5%9f%9f%e7%9a%84%e5%bc%80%e6%ba%90%e8%bd%af%e4%bb%b6-2","status":"publish","type":"post","link":"http:\/\/ai.gitpp.com\/index.php\/2023\/11\/04\/%e5%b7%a5%e4%b8%9a%e9%a2%86%e5%9f%9f%e7%9a%84%e5%bc%80%e6%ba%90%e8%bd%af%e4%bb%b6-2\/","title":{"rendered":"\u5de5\u4e1a\u9886\u57df\u7684\u5f00\u6e90\u8f6f\u4ef6"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>SCADA  :  <a href=\"https:\/\/github.com\/topics\/scada\">https:\/\/github.com\/topics\/scada<\/a><\/p>\n\n\n\n<p>SCADA<\/p>\n\n\n\n<p>      1\uff09 Conpot \u662f\u4e00\u4e2a ICS \u871c\u7f50\uff0c\u65e8\u5728\u6536\u96c6\u6709\u5173\u9488\u5bf9\u5de5\u4e1a\u63a7\u5236\u7cfb\u7edf\u7684\u5bf9\u624b\u7684\u52a8\u673a\u548c\u65b9\u6cd5\u7684\u60c5\u62a5<\/p>\n\n\n\n<p>         <a href=\"https:\/\/github.com\/mushorg\/conpot\">https:\/\/github.com\/mushorg\/conpot<\/a><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>2\uff09 ISF(\u5de5\u4e1a\u63a7\u5236\u7cfb\u7edf\u5f00\u53d1\u6846\u67b6)\uff0c\u57fa\u4e8ePython\u7684\u5f00\u53d1\u6846\u67b6<\/p>\n\n\n\n<p>     <a href=\"https:\/\/github.com\/dark-lbp\/isf\">  https:\/\/github.com\/dark-lbp\/isf <\/a><\/p>\n\n\n\n<p>3\uff09 <\/p>\n\n\n\n<p>     \u63d0\u4f9b\u5de5\u4e1a\u63a7\u5236\u7cfb\u7edf (ICS) \u4ee5\u53ca\u76d1\u63a7\u548c\u6570\u636e\u91c7\u96c6 (SCADA) \u7f51\u7edc\u7684\u6001\u52bf\u611f\u77e5\uff0c\u4ee5\u652f\u6301\u7f51\u7edc\u5b89\u5168\u8bc4\u4f30\u3002#nscyber<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/nsacyber\/GRASSMARLIN\">     https:\/\/github.com\/nsacyber\/GRASSMARLIN<\/a><\/p>\n\n\n\n<p>4\uff09PyScada\u662f\u4e00\u4e2a\u5f00\u6e90\u7684scada\u7cfb\u7edf\uff0c\u4f7f\u7528Django\u6846\u67b6\u4f5c\u4e3a\u540e\u7aef<\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/pyscada\/PyScada\">     https:\/\/github.com\/pyscada\/PyScada<\/a><\/p>\n\n\n\n<p>5\uff09\u9002\u7528\u4e8e\u53d8\u7535\u7ad9\u548c\u81ea\u52a8\u5316\u5e94\u7528\u7684 SCADA HMI\u3002<\/p>\n\n\n\n<p>      <a href=\"https:\/\/github.com\/pyscada\/PyScada\">https:\/\/github.com\/pyscada\/PyScada<\/a><\/p>\n\n\n\n<p>6\uff09<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>\u4e0e\u5de5\u4e1a\u63a7\u5236\u7cfb\u7edf (ICS) \u5b89\u5168\u76f8\u5173\u7684\u7cbe\u9009\u8d44\u6e90\u5217\u8868\u3002<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"user-content-tools\"><a href=\"https:\/\/github.com\/hslatman\/awesome-industrial-control-system-security#tools\">\u5de5\u5177<\/a><\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><a href=\"https:\/\/gitlab.com\/jhcastel\/attkfinder\">\u653b\u51fb\u67e5\u627e\u5668<\/a><\/td><td>AttkFinder \u662f\u4e00\u79cd\u5bf9 PLC \u7a0b\u5e8f\u8fdb\u884c\u9759\u6001\u7a0b\u5e8f\u5206\u6790\u5e76\u751f\u6210\u9762\u5411\u6570\u636e\u7684\u653b\u51fb\u5411\u91cf\u7684\u5de5\u5177\u3002\u7b80\u800c\u8a00\u4e4b\uff0cAttkFinder \u91c7\u7528\u6309\u7167 IEC-61131-3 \u6807\u51c6\u4ee5 xml \u683c\u5f0f\u6216\u7ed3\u6784\u5316\u6587\u672c\u7f16\u5199\u7684 PLC \u7a0b\u5e8f\uff0c\u6784\u5efa\u6570\u636e\u6d41\u56fe (DFG)\u3001\u63a7\u5236\u6d41\u56fe (CFG)\uff0c\u5e76\u5c06\u7a0b\u5e8f\u8f6c\u6362\u4e3a\u7ed3\u6784\u5316\u4e2d\u95f4\u8868\u793a\u8bed\u8a00 (STIR) \u7248\u672c\u3002\u7b26\u53f7\u6267\u884c\u5f15\u64ce\u5206\u6790\u6405\u62cc\u7248\u672c\u4ee3\u7801\uff0c\u641c\u7d22\u53ef\u88ab\u6076\u610f\u6267\u884c\u5668\u5229\u7528\u7684\u653b\u51fb\u5411\u91cf\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/github.com\/cisagov\/cset\">CSET<\/a><\/td><td>\u7f51\u7edc\u5b89\u5168\u8bc4\u4f30\u5de5\u5177 (CSET\u00ae) \u5e2e\u52a9\u7ec4\u7ec7\u4fdd\u62a4\u5176\u5173\u952e\u7684\u56fd\u5bb6\u7f51\u7edc\u8d44\u4ea7\u3002\u8be5\u5de5\u5177\u4e3a\u7528\u6237\u63d0\u4f9b\u4e86\u7cfb\u7edf\u4e14\u53ef\u91cd\u590d\u7684\u65b9\u6cd5\u6765\u8bc4\u4f30\u5176\u7f51\u7edc\u7cfb\u7edf\u548c\u7f51\u7edc\u7684\u5b89\u5168\u72b6\u51b5\u3002\u5b83\u5305\u62ec\u4e0e\u6240\u6709\u5de5\u4e1a\u63a7\u5236\u548c IT \u7cfb\u7edf\u76f8\u5173\u7684\u9ad8\u7ea7\u95ee\u9898\u548c\u8be6\u7ec6\u95ee\u9898\u3002\u200b<\/td><\/tr><tr><td><a href=\"https:\/\/www.digitalbond.com\/tools\/basecamp\/3s-codesys\/\">Digital Bond \u7684 3S CoDeSys \u5de5\u5177<\/a><\/td><td>Digital Bond \u521b\u5efa\u4e86\u4e09\u79cd\u4e0e\u8fd0\u884c CoDeSys \u7684 PLC \u4ea4\u4e92\u7684\u5de5\u5177\uff0c\u5305\u62ec\u547d\u4ee4 shell\u3001\u6587\u4ef6\u4f20\u8f93\u548c NMap \u811a\u672c\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/github.com\/digitalbond\/Redpoint\">Digital Bond \u7684 ICS \u679a\u4e3e\u5de5\u5177<\/a><\/td><td>Redpoint \u662f\u4e00\u4e2a Digital Bond \u7814\u7a76\u9879\u76ee\uff0c\u65e8\u5728\u4f7f\u7528 nmap \u6269\u5c55\u679a\u4e3e ICS \u5e94\u7528\u7a0b\u5e8f\u548c\u8bbe\u5907\u3002\u5b83\u53ef\u5728\u8bc4\u4f30\u8fc7\u7a0b\u4e2d\u7528\u4e8e\u53d1\u73b0 ICS \u8bbe\u5907\u5e76\u63d0\u53d6\u6709\u52a9\u4e8e\u4e8c\u6b21\u6d4b\u8bd5\u7684\u4fe1\u606f\u3002Redpoint \u5de5\u5177\u4f7f\u7528\u5408\u6cd5\u7684\u534f\u8bae\u6216\u5e94\u7528\u7a0b\u5e8f\u547d\u4ee4\u6765\u53d1\u73b0\u548c\u679a\u4e3e\u8bbe\u5907\u548c\u5e94\u7528\u7a0b\u5e8f\u3002\u6ca1\u6709\u52aa\u529b\u53bb\u5229\u7528\u6216\u7834\u574f\u4efb\u4f55\u4e1c\u897f\uff0c\u4f46\u8981\u660e\u667a\u548c\u5c0f\u5fc3\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/github.com\/iadgov\/GRASSMARLIN\">\u8349\u9c7c<\/a><\/td><td>GRASSMARLIN \u63d0\u4f9b\u5de5\u4e1a\u63a7\u5236\u7cfb\u7edf (ICS) \u4ee5\u53ca\u76d1\u63a7\u548c\u6570\u636e\u91c7\u96c6 (SCADA) \u7f51\u7edc\u7684 IP \u7f51\u7edc\u6001\u52bf\u611f\u77e5\uff0c\u4ee5\u652f\u6301\u7f51\u7edc\u5b89\u5168\u3002\u88ab\u52a8\u5730\u6620\u5c04\u548c\u76f4\u89c2\u5730\u663e\u793a ICS\/SCADA \u7f51\u7edc\u62d3\u6251\uff0c\u540c\u65f6\u5b89\u5168\u5730\u5bf9\u8fd9\u4e9b\u5173\u952e\u7f51\u7edc\u7269\u7406\u7cfb\u7edf\u8fdb\u884c\u8bbe\u5907\u53d1\u73b0\u3001\u6838\u7b97\u548c\u62a5\u544a\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/github.com\/fireeye\/ics_mem_collect\">ics_mem_collect<\/a><\/td><td>GE D20MX \u5185\u5b58\u6536\u96c6\u5668\u3002\u8be5\u9879\u76ee\u672c\u8eab\u53ef\u4ee5\u6269\u5c55\u4ee5\u4e0e\u5176\u4ed6\u8bbe\u5907\u4e00\u8d77\u4f7f\u7528\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/github.com\/dark-lbp\/isf\">\u56fd\u9645\u79d1\u5b66\u8054\u5408\u4f1a<\/a><\/td><td>\u5de5\u4e1a\u5f00\u53d1\u6846\u67b6\uff08ISF\uff09\u662f\u4e00\u4e2a\u7c7b\u4f3c\u4e8e Python \u7f16\u5199\u7684 Metasploit \u7684\u5f00\u53d1\u6846\u67b6\u3002\u5b83\u57fa\u4e8e\u5f00\u6e90 Routersploit \u5de5\u5177\u3002\u5b83\u5305\u542b\u9488\u5bf9\u591a\u79cd\u7c7b\u578b\u63a7\u5236\u5668\uff08\u4f8b\u5982 QNX\u3001Siemens \u548c Schneider \u8bbe\u5907\uff09\u7684\u6f0f\u6d1e\u5229\u7528\uff0c\u5e76\u5305\u542b\u591a\u4e2a\u626b\u63cf\u4eea\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/github.com\/w3h\/isf\">\u6b27\u6d32\u73af\u5883\u57fa\u91d1<\/a><\/td><td>\u5de5\u4e1a\u5b89\u5168\u5229\u7528\u6846\u67b6 (ISEF) \u662f\u4e00\u4e2a\u57fa\u4e8e Shadow Brokers \u53d1\u5e03\u7684 Equation Group Fuzzbunch \u5de5\u5177\u5305\u7684\u5229\u7528\u6846\u67b6\u3002\u5b83\u7531 ICSMASTER \u5b89\u5168\u56e2\u961f\u5f00\u53d1\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/github.com\/momalab\/ICSREF\">ICSREF<\/a><\/td><td>\u4e00\u4e2a\u6a21\u5757\u5316\u6846\u67b6\uff0c\u53ef\u81ea\u52a8\u6267\u884c\u4f7f\u7528 CODESYS v2 \u7f16\u8bd1\u5668\u7f16\u8bd1\u7684 CODESYS \u4e8c\u8fdb\u5236\u6587\u4ef6\u7684\u9006\u5411\u5de5\u7a0b\u8fc7\u7a0b\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/github.com\/momalab\/ICSFuzz\">ICSFuzz<\/a><\/td><td>\u4e00\u79cd PLC \u7aef\u6a21\u7cca\u6d4b\u8bd5\u5de5\u5177\uff0c\u7528\u4e8e\u53d1\u73b0 ICS \u63a7\u5236\u5e94\u7528\u7a0b\u5e8f\u4e2d\u7684\u6f0f\u6d1e\u3002\u5f53\u524d\u7248\u672c\u4ec5\u652f\u6301\u57fa\u4e8eCodesys\u5e73\u53f0\u7684\u5e94\u7528\u7a0b\u5e8f\uff0c\u8be5\u5e73\u53f0\u5df2\u9488\u5bf9Wago PLC\u8fdb\u884c\u4e86\u4fee\u6539\u548c\u9002\u914d\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/github.com\/woj-ciech\/Kamerka-GUI\">\ua4d8amerka GUI<\/a><\/td><td>\u7ec8\u6781\u7269\u8054\u7f51\/\u5de5\u4e1a\u63a7\u5236\u7cfb\u7edf\u4fa6\u5bdf\u5de5\u5177\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/github.com\/sourceperl\/mbtget\">mbtget<\/a><\/td><td>mbtget &#8211; \u7b80\u5355\u7684 perl \u811a\u672c\uff0c\u7528\u4e8e\u4ece\u547d\u4ee4\u884c\u8fdb\u884c\u4e00\u4e9b modbus \u4e8b\u52a1\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/github.com\/scy-phy\/minicps\">\u5c0f\u578bCPS<\/a><\/td><td>MiniCPS\uff1a\u65b0\u52a0\u5761\u79d1\u6280\u8bbe\u8ba1\u5927\u5b66 (SUTD) \u7684\u7f51\u7edc\u7269\u7406\u7cfb\u7edf\u5b89\u5168\u7814\u7a76\u5de5\u5177\u5305\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/github.com\/0x0mar\/smod\">MODBUS\u6e17\u900f\u6d4b\u8bd5\u6846\u67b6<\/a><\/td><td>smod \u662f\u4e00\u4e2a\u6a21\u5757\u5316\u6846\u67b6\uff0c\u5177\u6709\u6e17\u900f\u6d4b\u8bd5 modbus \u534f\u8bae\u6240\u9700\u7684\u5404\u79cd\u8bca\u65ad\u548c\u653b\u51fb\u529f\u80fd\u3002\u5b83\u662f\u4f7f\u7528 Python \u548c Scapy \u7684\u5b8c\u6574 Modbus \u534f\u8bae\u5b9e\u73b0\u3002\u8be5\u6846\u67b6\u53ef\u7528\u4e8e\u6267\u884c\u6f0f\u6d1e\u8bc4\u4f30\u3002<\/td><\/tr><tr><td><a href=\"http:\/\/modbuspal.sourceforge.net\/\">ModbusPal<\/a><\/td><td>ModbusPal \u662f MODBUS \u4ece\u7ad9\u6a21\u62df\u5668\u3002\u5176\u76ee\u7684\u662f\u63d0\u4f9b\u4e00\u4e2a\u6613\u4e8e\u4f7f\u7528\u7684\u754c\u9762\uff0c\u80fd\u591f\u91cd\u73b0\u590d\u6742\u4e14\u771f\u5b9e\u7684 MODBUS \u73af\u5883\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/github.com\/moki-ics\/modscan\">\u6a21\u7ec4\u626b\u63cf<\/a><\/td><td>ModScan \u662f\u4e00\u6b3e\u65b0\u5de5\u5177\uff0c\u65e8\u5728\u6620\u5c04\u57fa\u4e8e SCADA MODBUS TCP \u7684\u7f51\u7edc\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/sourceforge.net\/projects\/nettoplcsim\/\">\u7f51\u7edc\u5230PLC\u6a21\u62df<\/a><\/td><td>TCP\/IP-PLC \u4eff\u771f\u8f6f\u4ef6\u897f\u95e8\u5b50 PLCSim \u7684\u7f51\u7edc\u6269\u5c55\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/dnp3.github.io\/\">\u5f00\u653eDNP3<\/a><\/td><td>OpenDNP3 \u662f\u6839\u636e Apache \u8bb8\u53ef\u8bc1\u63d0\u4f9b\u7684 IEEE-1815 (DNP3) \u4e8b\u5b9e\u4e0a\u7684\u53c2\u8003\u5b9e\u73b0\u3002\u76ee\u524d\u5b83\u5904\u4e8e\u4ec5\u7ef4\u62a4\u6a21\u5f0f\uff0c\u4e0d\u518d\u6dfb\u52a0\u65b0\u529f\u80fd\u3002Automatak \u5df2\u66f4\u540d\u4e3a Step Function I\/O\uff0c\u73b0\u5728\u4e13\u6ce8\u4e8e\u7528 Rust \u7f16\u5199\u534f\u8bae<a href=\"https:\/\/stepfunc.io\/products\/libraries\/\">\u5e93\u3002<\/a><\/td><\/tr><tr><td><a href=\"https:\/\/github.com\/SCADACS\/PLCinject\">PLC\u6ce8\u5165<\/a><\/td><td>PLCinject \u53ef\u7528\u4e8e\u5c06\u4ee3\u7801\u6ce8\u5165 PLC\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/github.com\/yanlinlin82\/plcscan\">\u53ef\u7f16\u7a0b\u63a7\u5236\u5668\u626b\u63cf<\/a><\/td><td>\u7528\u4e8e\u901a\u8fc7 s7comm \u6216 modbus \u534f\u8bae\u626b\u63cf PLC \u8bbe\u5907\u7684\u5de5\u5177\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/www.digitalbond.com\/tools\/quickdraw\/download\/\">\u5feb\u901f\u7ed8\u56fe\u5165\u4fb5\u68c0\u6d4b\u7cfb\u7edf<\/a><\/td><td>Digital Bond \u7684 Quickdraw IDS \u9879\u76ee\u5305\u62ec SCADA \u8bbe\u5907\u7684 Snort \u89c4\u5219\u548c\u6240\u8c13\u7684\u7f51\u7edc\u6d41\u91cf\u9884\u5904\u7406\u5668\u3002\u9884\u5904\u7406\u5668\u63d0\u4f9b\u4e86\u663e\u7740\u7684\u9644\u52a0\u4ef7\u503c\uff0c\u56e0\u4e3a\u5b83\u4eec\u80fd\u591f\u91cd\u5efa\u534f\u8bae\u548c\u72b6\u6001\u4ee5\u4f9b Snort \u4f7f\u7528\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/github.com\/dw2102\/S7Comm-Analyzer\">S7Comm\u5206\u6790\u4eea<\/a><\/td><td>Bro \u7684\u63d2\u4ef6\uff0c\u7528\u4e8e\u89e3\u6790 S7comm \u534f\u8bae\u6570\u636e\u6d41\u91cf\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/github.com\/0xICF\/SCADAShutdownTool\">SCADA\u5173\u673a\u5de5\u5177<\/a><\/td><td>SCADAShutdownTool \u662f\u4e00\u6b3e\u5de5\u4e1a\u63a7\u5236\u7cfb\u7edf\u81ea\u52a8\u5316\u548c\u6d4b\u8bd5\u5de5\u5177\uff0c\u5141\u8bb8\u5b89\u5168\u7814\u7a76\u4eba\u5458\u548c\u4e13\u5bb6\u6d4b\u8bd5 SCADA \u5b89\u5168\u7cfb\u7edf\u3001\u679a\u4e3e\u4ece\u5c5e\u63a7\u5236\u5668\u3001\u8bfb\u53d6\u63a7\u5236\u5668\u7684\u5bc4\u5b58\u5668\u503c\u548c\u91cd\u5199\u5bc4\u5b58\u5668\u6570\u636e\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/github.com\/mssabr01\/sixnet-tools\">Sixnet \u5de5\u5177<\/a><\/td><td>\u7528\u4e8e\u5229\u7528 Sixnet RTU \u7684\u5de5\u5177\u3002\u8fd9\u4e2a\u7b80\u5355\u7684\u547d\u4ee4\u884c\u754c\u9762\u5141\u8bb8\u4f7f\u7528\u672a\u8bb0\u5f55\u7684\u529f\u80fd\u4ee3\u7801\u6765\u83b7\u5f97 root \u8bbf\u95ee\u6743\u9650\u5e76\u63a7\u5236\u67d0\u4e9b Sixnet \u7cfb\u5217\u5de5\u4e1a\u63a7\u5236\u8bbe\u5907\u4e0a\u7684\u5e95\u5c42 Linux \u64cd\u4f5c\u7cfb\u7edf\u3002<\/td><\/tr><tr><td><a href=\"http:\/\/snap7.sourceforge.net\/\">\u5feb\u71677<\/a><\/td><td>Snap7 \u662f\u4e00\u6b3e\u5f00\u6e90\u300132\/64 \u4f4d\u3001\u591a\u5e73\u53f0\u4ee5\u592a\u7f51\u901a\u4fe1\u5957\u4ef6\uff0c\u7528\u4e8e\u4e0e\u897f\u95e8\u5b50 S7 PLC \u8fdb\u884c\u672c\u5730\u8fde\u63a5\u3002\u65b0\u7684 CPU 1200\/1500\u3001\u65e7\u7684 S7200\u3001\u5c0f\u578b LOGO 0BA7\/0BA8 \u548c SINAMICS \u9a71\u52a8\u5668\u4e5f\u53d7\u5230\u90e8\u5206\u652f\u6301\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/github.com\/klsecservices\/s7scan\">s7\u626b\u63cf<\/a><\/td><td>\u4e00\u4e2a\u7528 Python \u7f16\u5199\u7684\u5de5\u5177\uff0c\u7528\u4e8e\u626b\u63cf\u7f51\u7edc\u3001\u679a\u4e3e\u897f\u95e8\u5b50 PLC \u5e76\u6536\u96c6\u6709\u5173\u5b83\u4eec\u7684\u57fa\u672c\u4fe1\u606f\uff0c\u4f8b\u5982 PLC \u56fa\u4ef6\u548c\u786c\u4ef6\u7248\u672c\u3001\u7f51\u7edc\u914d\u7f6e\u548c\u5b89\u5168\u53c2\u6570\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/github.com\/hslatman\/awesome-industrial-control-system-security\/blob\/main\/source\/s7-cracker.py\">S7 \u5bc6\u7801\u66b4\u529b\u7834\u89e3\u5668<\/a><\/td><td>\u4e00\u79cd\u4f7f\u7528\u5b57\u5178\u4ece PCAP \u66b4\u529b\u7834\u89e3 S7 \u5b9e\u4f8b\u4f7f\u7528\u7684\u5bc6\u7801\u7684\u5de5\u5177\u3002<a href=\"https:\/\/github.com\/hslatman\/awesome-industrial-control-system-security\/blob\/main\/source\/s7-brute-offline.py\">\u7531 SCADAStrangelove\u539f\u521b<\/a>\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/splone.com\/splonebox\/\">\u65af\u666e\u9686\u76d2<\/a><\/td><td>splonebox \u662f\u4e00\u6b3e\u4e13\u6ce8\u4e8e\u6a21\u5757\u5316\u7684\u5f00\u6e90\u7f51\u7edc\u8bc4\u4f30\u5de5\u5177\u3002\u5b83\u63d0\u4f9b\u5bf9\u7f51\u7edc\u53ca\u5176\u8bbe\u5907\u7684\u6301\u7eed\u5206\u6790\u3002\u4e00\u9879\u4e3b\u8981\u8bbe\u8ba1\u51b3\u7b56\u7684\u7279\u70b9\u662f\u5f00\u53d1\u81ea\u5b9a\u4e49\u63d2\u4ef6\uff0c\u5305\u62ec\u5de5\u4e1a\u901a\u4fe1\u534f\u8bae\u7684\u63d2\u4ef6\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/www.wireshark.org\/\">Wireshark<\/a><\/td><td>Wireshark \u662f\u4e16\u754c\u4e0a\u6700\u91cd\u8981\u7684\u7f51\u7edc\u534f\u8bae\u5206\u6790\u5668\u3002\u5b83\u53ef\u4ee5\u8ba9\u60a8\u5728\u5fae\u89c2\u5c42\u9762\u4e0a\u4e86\u89e3\u7f51\u7edc\u4e0a\u53d1\u751f\u7684\u60c5\u51b5\u3002\u5b83\u662f\u8bb8\u591a\u884c\u4e1a\u548c\u6559\u80b2\u673a\u6784\u4e8b\u5b9e\u4e0a\u7684\uff08\u901a\u5e38\u662f\u6cd5\u5f8b\u4e0a\u7684\uff09\u6807\u51c6\u3002\u5b83\u652f\u6301 ICS \u4e2d\u4f7f\u7528\u7684\u8bb8\u591a\u534f\u200b\u200b\u8bae\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/github.com\/otoriocyber\/PCS7-Hardening-Tool\">PCS7-\u5f3a\u5316\u5de5\u5177<\/a><\/td><td>\u4e00\u4e2a\u72ec\u7acb\u7684 PowerShell \u811a\u672c\uff0c\u6839\u636e\u897f\u95e8\u5b50\u5b89\u5168\u6307\u5357\u679a\u4e3e\u897f\u95e8\u5b50 PCS 7 DCS \u670d\u52a1\u5668\u4e0a\u7684\u5b89\u5168\u95ee\u9898\u3002\u521b\u5efa\u8005\uff1a OTORIO<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"user-content-distributions\"><a href=\"https:\/\/github.com\/hslatman\/awesome-industrial-control-system-security#distributions\">\u53d1\u884c\u7248<\/a><\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><a href=\"https:\/\/github.com\/moki-ics\/moki\">\u83ab\u57faLinux<\/a><\/td><td>Moki \u662f\u5bf9 Kali \u7684\u4fee\u6539\uff0c\u6574\u5408\u4e86\u5206\u6563\u5728\u4e92\u8054\u7f51\u4e0a\u7684\u5404\u79cd ICS\/SCADA \u5de5\u5177\uff0c\u521b\u5efa\u4e86\u4e00\u4e2a\u9762\u5411 ICS\/SCADA \u6e17\u900f\u6d4b\u8bd5\u4e13\u4e1a\u4eba\u200b\u200b\u5458\u7684\u5b9a\u5236 Kali Linux\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/www.controlthings.io\/\">ControlThings \u5e73\u53f0\uff08\u4ee5\u524d\u79f0\u4e3a SamuraiSTFU\uff09<\/a><\/td><td>ControlThings Platform \u662f\u9762\u5411 ICS \u7f51\u7edc\u5b89\u5168\u56e2\u961f\u7684\u5f00\u6e90 Linux \u53d1\u884c\u7248\u3002\u5b83\u91c7\u7528\u4e86\u9488\u5bf9\u4f20\u7edf IT \u57fa\u7840\u8bbe\u65bd\u7684\u540c\u7c7b\u6700\u4f73\u5b89\u5168\u8bc4\u4f30\u5de5\u5177\uff0c\u5e76\u6dfb\u52a0\u4e86\u9488\u5bf9\u5d4c\u5165\u5f0f\u7535\u5b50\u3001\u4e13\u6709\u65e0\u7ebf\u7684\u4e13\u7528\u5de5\u5177\uff0c\u4ee5\u53ca\u5927\u91cf ICS \u7279\u5b9a\u8bc4\u4f30\u5de5\u5177\uff0c\u8fd9\u4e9b\u5de5\u5177\u5747\u6765\u81ea\u793e\u533a\u4ee5\u53ca\u7531 ControlThings I\/O \u521b\u5efa\u7684\u81ea\u5b9a\u4e49\u5de5\u5177\u56e2\u961f\u3002<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"user-content-honeypots\"><a href=\"https:\/\/github.com\/hslatman\/awesome-industrial-control-system-security#honeypots\">\u871c\u7f50<\/a><\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><a href=\"https:\/\/github.com\/mushorg\/conpot\">\u5eb7\u6ce2\u7279<\/a><\/td><td>Conpot \u662f\u4e00\u4e2a\u4f4e\u4ea4\u4e92\u670d\u52a1\u5668\u7aef\u5de5\u4e1a\u63a7\u5236\u7cfb\u7edf\u871c\u7f50\uff0c\u65e8\u5728\u6613\u4e8e\u90e8\u7f72\u3001\u4fee\u6539\u548c\u6269\u5c55\u3002\u5b83\u5177\u6709\u8f7b\u677e\u5b9a\u5236\u548c\u884c\u4e3a\u6a21\u4eff\u7b49\u529f\u80fd\uff0c\u5e76\u4e14\u53ef\u4ee5\u901a\u8fc7\u771f\u5b9e\u7684 HMI \u8fdb\u884c\u6269\u5c55\u3002\u5728 Honeynet \u9879\u76ee\u4e0b\u6784\u5efa\u548c\u7ef4\u62a4\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/github.com\/sjhilt\/GasPot\">\u7164\u6c14\u7f50<\/a><\/td><td>GasPot \u662f\u4e00\u4e2a\u871c\u7f50\uff0c\u65e8\u5728\u6a21\u62df Veeder Root Gaurdian AST\u3002\u8fd9\u4e9b\u50a8\u7f50\u538b\u529b\u8868\u5728\u77f3\u6cb9\u548c\u5929\u7136\u6c14\u884c\u4e1a\u4e2d\u5f88\u5e38\u89c1\uff0c\u7528\u4e8e\u52a0\u6cb9\u7ad9\u50a8\u7f50\uff0c\u4ee5\u5e2e\u52a9\u5e93\u5b58\u71c3\u6599\u3002GasPot \u7684\u8bbe\u8ba1\u76ee\u7684\u662f\u5c3d\u53ef\u80fd\u968f\u673a\u5316\uff0c\u56e0\u6b64\u6ca1\u6709\u4e24\u4e2a\u5b9e\u4f8b\u770b\u8d77\u6765\u5b8c\u5168\u76f8\u540c\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/dtag-dev-sec.github.io\/mediator\/feature\/2016\/03\/11\/t-pot-16.03.html\">T \u578b\u9505<\/a><\/td><td>T-Pot \u662f\u5728 docker \u5bb9\u5668\u4e2d\u8fd0\u884c\u7684\u591a\u4e2a\u871c\u7f50\u7684\u7ec4\u5408\u3002Suricata \u548c ELK \u5806\u6808\u7528\u4e8e\u5b89\u5168\u76d1\u63a7\u548c\u53ef\u89c6\u5316\u3002\u5176\u4e2d\uff0c\u5b83\u7684\u7279\u8272\u662f Conpot \u548c eMobility\uff0c\u5b83\u4eec\u662f ICS \u548c\u4e0b\u4e00\u4ee3\u4ea4\u901a\u57fa\u7840\u8bbe\u65bd\u871c\u7f50\u3002<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"user-content-data\"><a href=\"https:\/\/github.com\/hslatman\/awesome-industrial-control-system-security#data\">\u6570\u636e<\/a><\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><a href=\"http:\/\/www.netresec.com\/?page=PCAP4SICS\">4SICS ICS \u5b9e\u9a8c\u5ba4 PC\u200b\u200bAPS<\/a><\/td><td>4SICS \u7684\u201cGeek Lounge\u201d\u5305\u542b\u4e00\u4e2a ICS \u5b9e\u9a8c\u5ba4\uff0c\u914d\u6709 PLC\u3001RTU\u3001\u670d\u52a1\u5668\u3001\u5de5\u4e1a\u7f51\u7edc\u8bbe\u5907\uff08\u4ea4\u6362\u673a\u3001\u9632\u706b\u5899\u7b49\uff09\u3002\u8fd9\u4e9b\u8bbe\u5907\u53ef\u4f9b 4SICS \u4e0e\u4f1a\u8005\u8fdb\u884c\u5b9e\u9645\u201c\u6d4b\u8bd5\u201d\uff0c\u5e76\u5df2\u4ece\u4e2d\u6355\u83b7\u6d41\u91cf\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/media.defcon.org\/DEF%20CON%2023\/DEF%20CON%2023%20villages\/DEF%20CON%2023%20ics%20village\/DEF%20CON%2023%20ICS%20Village%20packet%20captures.rar\">DEF CON 23 ICS \u6751 PCAPS<\/a><\/td><td>\u6765\u81ea\u7b2c 23 \u5c4a DEF CON \u7684 PCAPS\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/icsmap.shodan.io\/\">ICS \u5730\u56fe<\/a><\/td><td>\u6839\u636e Shodan \u6536\u96c6\u7684\u6570\u636e\u521b\u5efa\u7684\u5730\u56fe\uff0c\u663e\u793a ICS \u8bbe\u5907\u3002\u6570\u636e\u53ef\u7528\u4e8e\u8fdb\u4e00\u6b65\u5206\u6790\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/github.com\/automayt\/ICS-pcap\">Jason Smith \u7684 ICS PCAP \u7cfb\u5217<\/a><\/td><td>\u9002\u7528\u4e8e\u5404\u79cd ICS \u5b9e\u7528\u7a0b\u5e8f\u548c\u534f\u8bae\u7684 PCAP \u96c6\u5408\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/ics-radar.shodan.io\/\">\u5de5\u4e1a\u63a7\u5236\u96f7\u8fbe<\/a><\/td><td>Shodan \u4ece\u591a\u79cd\u7c7b\u578b\u7684 ICS \u534f\u8bae\u6536\u96c6\u7684\u6570\u636e\u5728\u5730\u7403\u4e0a\u53ef\u89c6\u5316\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/www.netresec.com\/?page=DigitalBond_S4\">S4x15 ICS \u6751<\/a><\/td><td>\u6bd4\u8d5b\u671f\u95f4\u4f7f\u7528\u7684 S4x15 CTF \u7684 PCAPS \u955c\u50cf\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/sourceforge.net\/projects\/s7commwireshark\/files\/Sample-captures\/\">S7 PCAP \u6837\u54c1<\/a><\/td><td>Wireshark S7 \u534f\u8bae\u89e3\u6790\u5668\u63d2\u4ef6\u7684\u793a\u4f8b\u6587\u4ef6\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/github.com\/scadastrangelove\/SCADAPASS\">\u6570\u636e\u91c7\u96c6\u200b\u200b\u5361<\/a><\/td><td>\u8457\u540d\u7684 SCADA StrangeLove \u9ed8\u8ba4\/\u786c\u7f16\u7801\u5bc6\u7801\u5217\u8868\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/github.com\/ICSrepo\/TRISIS-TRITON-HATMAN\">TRISIS\/TRITON\/HATMAN \u6076\u610f\u8f6f\u4ef6\u5b58\u50a8\u5e93<\/a><\/td><td>\u5305\u542b\u9488\u5bf9 Triconex \u5b89\u5168\u4eea\u8868\u7cfb\u7edf (SIS) \u63a7\u5236\u5668\u7684 TRISIS\/TRITON\/HATMAN \u6076\u610f\u8f6f\u4ef6\u7684\u539f\u59cb\u6587\u4ef6\u548c\u53cd\u7f16\u8bd1\u6587\u4ef6\u7684\u5b58\u50a8\u5e93\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/github.com\/gkabasele\/HVAC_Traces\">\u6696\u901a\u7a7a\u8c03\u75d5\u8ff9<\/a><\/td><td>\u5305\u542b\u6765\u81ea\u5927\u5b66 HVAC \u7cfb\u7edf\u7684 PCAP \u8ddf\u8e2a\u7684\u5b58\u50a8\u5e93\uff0c\u53ef\u7528\u4e8e\u8bc4\u4f30\u7f51\u7edc\u5165\u4fb5\u68c0\u6d4b\u7cfb\u7edf\u3002<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"user-content-frameworks\"><a href=\"https:\/\/github.com\/hslatman\/awesome-industrial-control-system-security#frameworks\">\u6784\u67b6<\/a><\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><a href=\"https:\/\/github.com\/nathanpocock\/I-ISMS\">\u4fe1\u606f\u7ba1\u7406\u7cfb\u7edf<\/a><\/td><td>\u5de5\u4e1a\u4fe1\u606f\u5b89\u5168\u7ba1\u7406\u7cfb\u7edf\uff08I-ISMS\uff09\u53ef\u7528\u4e8e\u5728\u5de5\u4e1a\u73af\u5883\u4e2d\u5feb\u901f\u90e8\u7f72\u4fe1\u606f\u5b89\u5168\u7ba1\u7406\u7a0b\u5e8f\u3002\u5b83\u63d0\u4f9b\u4e86\u4ece\u57fa\u7840\u5f00\u59cb\u521b\u5efa\u548c\u5b9e\u65bd\u7a0b\u5e8f\u7684\u6a21\u677f\u3002<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"user-content-feeds-and-news\"><a href=\"https:\/\/github.com\/hslatman\/awesome-industrial-control-system-security#feeds-and-news\">\u63d0\u8981\u548c\u65b0\u95fb<\/a><\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><a href=\"https:\/\/ics-cert.us-cert.gov\/alerts\">ICS-CERT \u8b66\u62a5<\/a><\/td><td>ICS-CERT \u8b66\u62a5\u6e90\u65e8\u5728\u53ca\u65f6\u5411\u5173\u952e\u57fa\u7840\u8bbe\u65bd\u6240\u6709\u8005\u548c\u8fd0\u8425\u5546\u63d0\u4f9b\u6709\u5173\u53ef\u80fd\u5f71\u54cd\u5173\u952e\u57fa\u7840\u8bbe\u65bd\u8ba1\u7b97\u7f51\u7edc\u7684\u5a01\u80c1\u6216\u6d3b\u52a8\u7684\u901a\u77e5\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/ics-cert.us-cert.gov\/xml\/rss.xml\">ICS-CERT RSS \u6e90<\/a><\/td><td>\u7f8e\u56fd ICS-CERT \u7684 RSS \u6e90\u5217\u51fa\u4e86\u65b0\u95fb\u548c\u65b0\u53d1\u5e03\u7684\u6f0f\u6d1e\u516c\u544a\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/new.siemens.com\/global\/en\/products\/services\/cert.html\">\u5de5\u4e1a\u5b89\u5168\u8b66\u62a5<\/a><\/td><td>\u897f\u95e8\u5b50\u901a\u8fc7\u6b64\u9875\u9762\u548c RSS \u6e90\u4e3a\u5176\u5de5\u4e1a\u7cfb\u7edf\u63d0\u4f9b\u8b66\u62a5\u3002<\/td><\/tr><tr><td><a href=\"http:\/\/www.nerc.com\/pa\/rrm\/bpsa\/Pages\/Alerts.aspx\">\u5317\u7f8e\u7535\u529b\u53ef\u9760\u6027\u516c\u53f8 (NERC) \u8b66\u62a5<\/a><\/td><td>NERC \u63d0\u4f9b\u5927\u5bb9\u91cf\u7535\u529b\u7cfb\u7edf (BES) \u5b89\u5168\u5efa\u8bae\u548c\u884c\u4e1a\u5efa\u8bae\u7684\u8b66\u62a5\u3002<\/td><\/tr><tr><td><a href=\"http:\/\/new.abb.com\/about\/technology\/cyber-security\/alerts-and-notifications\">ABB \u7f51\u7edc\u5b89\u5168\u8b66\u62a5\u548c\u901a\u77e5<\/a><\/td><td>ABB \u4e3a\u5176\u7f51\u7edc\u5b89\u5168\u4e8b\u4ef6\u548c\u8f6f\u4ef6\u6f0f\u6d1e\u63d0\u4f9b\u8b66\u62a5\u3002<\/td><\/tr><tr><td><a href=\"http:\/\/software.schneider-electric.com\/support\/cyber-security-updates\/\">\u65bd\u8010\u5fb7\u7535\u6c14\u7f51\u7edc\u5b89\u5168\u8b66\u62a5\u548c\u901a\u77e5<\/a><\/td><td>\u4ece\u65bd\u8010\u5fb7\u7535\u6c14\u8f6f\u4ef6\u83b7\u53d6\u6709\u5173\u7f51\u7edc\u5b89\u5168\u548c\u5408\u89c4\u6027\u7684\u6700\u65b0\u66f4\u65b0\u548c\u8b66\u62a5\u3002<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"user-content-conferences-and-conference-material\"><a href=\"https:\/\/github.com\/hslatman\/awesome-industrial-control-system-security#conferences-and-conference-material\">\u4f1a\u8bae\u548c\u4f1a\u8bae\u6750\u6599<\/a><\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><a href=\"https:\/\/cs3sthlm.se\/\">CS3STHLM<\/a><\/td><td>\u65af\u5fb7\u54e5\u5c14\u6469 SCADA \u548c\u5de5\u4e1a\u63a7\u5236\u7cfb\u7edf\u7f51\u7edc\u5b89\u5168\u56fd\u9645\u5cf0\u4f1a\u662f\u4e00\u5e74\u4e00\u5ea6\u7684\u5cf0\u4f1a\uff0c\u805a\u96c6\u4e86\u5173\u952e\u6d41\u7a0b\u548c\u884c\u4e1a\u4e2d\u6700\u91cd\u8981\u7684\u5229\u76ca\u76f8\u5173\u8005\u3002CS3STHLM \u81ea 2014 \u5e74\u4e3e\u529e\u4ee5\u6765\uff0c\u5df2\u8fc5\u901f\u6210\u4e3a\u5317\u6b27\u9996\u5c48\u4e00\u6307\u7684 ICS \u5b89\u5168\u5cf0\u4f1a\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/cs3sthlm.se\/\">CS4CA<\/a><\/td><td>\u5173\u952e\u8d44\u4ea7\u7f51\u7edc\u5b89\u5168\u662f\u4e00\u7cfb\u5217\u5168\u7403\u5cf0\u4f1a\uff0c\u91cd\u70b9\u5173\u6ce8\u5173\u952e\u57fa\u7840\u8bbe\u65bd\u7684\u7f51\u7edc\u5b89\u5168\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/www.sans.org\/cyber-security-summit\/archives\">SANS ICS \u5cf0\u4f1a\u6863\u6848<\/a><\/td><td>\u5168\u7403\u4e3e\u529e\u7684 SANS ICS \u5cf0\u4f1a\u6f14\u793a\u6750\u6599\u7684\u4e2d\u592e\u5b58\u50a8\u5e93\uff08\u4e0e\u5176\u4ed6\u5cf0\u4f1a\u4ea4\u9519\uff09\u3002<\/td><\/tr><tr><td><a href=\"http:\/\/www.icscybersecurityconference.com\/\">SANS ICS \u7f51\u7edc\u5b89\u5168\u4f1a\u8bae (WeissCon)<\/a><\/td><td>\u8be5\u4f1a\u8bae\u4ee5\u5176\u521b\u59cb\u4eba Joe Weiss \u7684\u540d\u5b57\u88ab\u4eb2\u5207\u5730\u79f0\u4e3a WeissCon\uff0c\u73b0\u5728\u7531 SecurityWeek \u6240\u6709\u548c\u8fd0\u8425\uff0c\u901a\u5e38\u4e8e\u6bcf\u5e74 10 \u6708\u5728\u7f8e\u56fd\u7684\u4e0d\u540c\u5730\u70b9\u4e3e\u884c\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/ics.kaspersky.com\/conference\/\">\u5361\u5df4\u65af\u57fa\u5de5\u4e1a\u7f51\u7edc\u5b89\u5168\u4f1a\u8bae (KICS con)<\/a><\/td><td>\u7531\u5361\u5df4\u65af\u57fa\u4e3b\u529e\u7684\u5e74\u5ea6\u56fd\u9645\u5de5\u4e1a\u7f51\u7edc\u5b89\u5168\u4f1a\u8bae\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/iccps.acm.org\/\">ICCPS\uff1aACM\/IEEE \u7f51\u7edc\u7269\u7406\u7cfb\u7edf\u56fd\u9645\u4f1a\u8bae<\/a><\/td><td>ICCPS\uff08ACM\/IEEE \u56fd\u9645\u7f51\u7edc\u7269\u7406\u7cfb\u7edf\u4f1a\u8bae\uff09\u7684\u76ee\u6807\u662f\u4f5c\u4e3a\u4e00\u4e2a\u5355\u4e00\u8bba\u575b\uff0c\u62a5\u544a\u7f51\u7edc\u7269\u7406\u7cfb\u7edf\u5404\u4e2a\u65b9\u9762\u7684\u8fdb\u5c55\uff0c\u5305\u62ec\u4f46\u4e0d\u9650\u4e8e\u7406\u8bba\u3001\u5de5\u5177\u3001\u5e94\u7528\u3001\u7cfb\u7edf\u548c\u6d4b\u8bd5\u5e73\u53f0\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/www.acsac.org\/2021\/workshops\/icss\/\">\u5de5\u4e1a\u63a7\u5236\u7cfb\u7edf\u5b89\u5168\uff08ICSS\uff09\u7814\u8ba8\u4f1a<\/a><\/td><td>\u672c\u6b21\u7814\u8ba8\u4f1a\u7684\u76ee\u6807\u662f\u63a2\u7d22\u65b0\u6280\u672f\uff0c\u4ee5\u6539\u8fdb\u5b89\u5168\u5173\u952e\u63a7\u5236\u7cfb\u7edf\u4ee5\u5e94\u5bf9\u65b0\u51fa\u73b0\u7684\u5a01\u80c1\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/link.springer.com\/book\/10.1007\/978-3-030-95484-0\">\u5de5\u4e1a\u63a7\u5236\u7cfb\u7edf\u548c\u7f51\u7edc\u7269\u7406\u7cfb\u7edf\u5b89\u5168\u7814\u8ba8\u4f1a\uff08Cyber\u200b\u200bICPS\uff09<\/a><\/td><td>Cyber\u200b\u200bICPS \u65e8\u5728\u901a\u8fc7\u63d0\u4f9b\u4e00\u4e2a\u8bba\u575b\u6765\u8ba8\u8bba\u4e0e\u7f51\u7edc\u5b89\u5168\u76f8\u5173\u7684\u6240\u6709\u95ee\u9898\uff0c\u5c06\u5728\u65e5\u76ca\u63a5\u89e6\u7f51\u7edc\u7a7a\u95f4\u7684\u80cc\u666f\u4e0b\u5bf9 ICS \u548c CPS \u5b89\u5168\u611f\u5174\u8da3\u7684\u7814\u7a76\u4eba\u5458\u3001\u5de5\u7a0b\u5e08\u548c\u653f\u5e9c\u884c\u4e3a\u8005\u805a\u96c6\u5728\u4e00\u8d77\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/cpsiotsec.github.io\/\">CPS \u548c\u7269\u8054\u7f51\u5b89\u5168\u4e0e\u9690\u79c1\u7814\u8ba8\u4f1a (CPSIoTSec)<\/a><\/td><td>CPS&amp;IoT \u5b89\u5168\u548c\u9690\u79c1\u8054\u5408\u7814\u8ba8\u4f1a\u65e8\u5728\u4ecb\u7ecd\u5728\u89e3\u51b3 CPS \u548c IoT \u5b89\u5168\u548c\u9690\u79c1\u95ee\u9898\u9886\u57df\u6240\u505a\u7684\u5de5\u4f5c\u3002<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"user-content-literature\"><a href=\"https:\/\/github.com\/hslatman\/awesome-industrial-control-system-security#literature\">\u6587\u5b66<\/a><\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><a href=\"https:\/\/collaborate.mitre.org\/attackics\/index.php\/Main_Page\">MITRE \u7528\u4e8e\u5de5\u4e1a\u63a7\u5236\u7cfb\u7edf\u7684 ATT&amp;CK\u00ae<\/a><\/td><td>ICS \u7684 ATT&amp;CK \u662f\u4e00\u4e2a\u77e5\u8bc6\u5e93\uff0c\u53ef\u7528\u4e8e\u63cf\u8ff0\u5bf9\u624b\u5728 ICS \u7f51\u7edc\u4e2d\u64cd\u4f5c\u65f6\u53ef\u80fd\u91c7\u53d6\u7684\u884c\u52a8\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/scadahacker.com\/library\/index.html\">\u5de5\u4e1a\u63a7\u5236\u7cfb\u7edf\u7f51\u7edc\u5b89\u5168\u8d44\u6e90\u5e93<\/a><\/td><td>SCADAhacker.com ICS\/SCADA \u7f51\u7edc\u5b89\u5168\u8d44\u6e90\u7684\u7ec8\u6781\u5217\u8868\u3002<\/td><\/tr><tr><td><a href=\"http:\/\/www.amazon.com\/Applied-Cyber-Security-Smart-Grid\/dp\/1597499986\/\">\u5e94\u7528\u7f51\u7edc\u5b89\u5168\u548c\u667a\u80fd\u7535\u7f51<\/a><\/td><td>\u5e94\u7528\u7f51\u7edc\u5b89\u5168\u548c\u667a\u80fd\u7535\u7f51\uff1a\u5728\u73b0\u4ee3\u7535\u529b\u57fa\u7840\u8bbe\u65bd\u4e2d\u5b9e\u65bd\u5b89\u5168\u63a7\u5236\u4f5c\u8005\uff1aEric D. Knapp \u548c Raj Samani\u3002<\/td><\/tr><tr><td><a href=\"http:\/\/www.robertmlee.org\/a-collection-of-resources-for-getting-started-in-icsscada-cybersecurity\/\">ICS\/SCADA \u7f51\u7edc\u5b89\u5168\u5165\u95e8\u8d44\u6e90\u96c6\u5408<\/a><\/td><td>Robert M. Lee \u5bf9 ICS \u548c SCADA \u5b89\u5168\u65b9\u9762\u7684\u4e00\u4e9b\u4f18\u8d28\u8d44\u6e90\u7684\u770b\u6cd5\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/documents.trendmicro.com\/assets\/wp\/wp-hacker-machine-interface.pdf\">\u9ed1\u5ba2\u673a\u5668\u754c\u9762 &#8211; SCADA HMI \u6f0f\u6d1e\u73b0\u72b6<\/a><\/td><td>\u8d8b\u52bf\u79d1\u6280\u96f6\u65e5\u8ba1\u5212\u56e2\u961f\u53d1\u8868\u7684\u6709\u5173 SCADA \u548c HMI \u5b89\u5168\u73b0\u72b6\u7684 TrendLabs \u7814\u7a76\u8bba\u6587\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/www.amazon.com\/Handbook-Control-Systems-Security-Second\/dp\/1498717071\/ref=sr_1_5?s=books&amp;ie=UTF8&amp;qid=1472416488&amp;sr=1-5&amp;keywords=scada+security\">SCADA\/\u63a7\u5236\u7cfb\u7edf\u5b89\u5168\u624b\u518c<\/a><\/td><td>\u8fd9\u672c\u7efc\u5408\u624b\u518c\u6db5\u76d6\u4e86\u4e0e\u76d1\u63a7\u548c\u6570\u636e\u91c7\u96c6 (SCADA) \u4ee5\u53ca\u5168\u7403\u516c\u7528\u4e8b\u4e1a\u548c\u5de5\u4e1a\u8bbe\u65bd\u4e2d\u4f7f\u7528\u7684\u5176\u4ed6\u5de5\u4e1a\u63a7\u5236\u7cfb\u7edf\u76f8\u5173\u7684\u57fa\u672c\u5b89\u5168\u6982\u5ff5\u3001\u65b9\u6cd5\u548c\u76f8\u5173\u4fe1\u606f\u3002<\/td><\/tr><tr><td><a href=\"http:\/\/www.isaca.org\/Journal\/archives\/2014\/Volume-1\/Documents\/SCADA-Cybersecurity-Framework_joa_Eng_0114.pdf\">SCADA\u7f51\u7edc\u5b89\u5168\u6846\u67b6<\/a><\/td><td>\u63cf\u8ff0 SCADA \u7f51\u7edc\u5b89\u5168\u6846\u67b6\u5e94\u5305\u542b\u54ea\u4e9b\u5185\u5bb9\u7684\u8bba\u6587\u3002<\/td><\/tr><tr><td><a href=\"http:\/\/www.amazon.com\/Industrial-Network-Security-Second-Edition\/dp\/0124201148\/ref=sr_1_3?ie=UTF8&amp;qid=1414970315&amp;sr=8-3&amp;keywords=industrial+network+security\">\u5de5\u4e1a\u7f51\u7edc\u5b89\u5168\uff0c\u7b2c\u4e8c\u7248<\/a><\/td><td>\u5de5\u4e1a\u7f51\u7edc\u5b89\u5168\uff0c\u7b2c\u4e8c\u7248\uff1a\u4fdd\u62a4\u667a\u80fd\u7535\u7f51\u3001SCADA \u548c\u5176\u4ed6\u5de5\u4e1a\u63a7\u5236\u7cfb\u7edf\u7684\u5173\u952e\u57fa\u7840\u8bbe\u65bd\u7f51\u7edc\uff0c\u4f5c\u8005\uff1aEric D. Knapp \u548c Joel Thomas Langill\u3002<\/td><\/tr><tr><td><a href=\"http:\/\/www.amazon.com\/Power-System-SCADA-Smart-Grids\/dp\/148222674X\">\u7535\u529b\u7cfb\u7edf SCADA \u548c\u667a\u80fd\u7535\u7f51<\/a><\/td><td>\u672c\u4e66\u5728\u4e00\u672c\u7b80\u660e\u7684\u4e66\u4e2d\u6c47\u96c6\u4e86\u7535\u529b\u7cfb\u7edf\u76d1\u63a7\u548c\u6570\u636e\u91c7\u96c6\uff08SCADA\uff09\u7684\u57fa\u7840\u77e5\u8bc6\u548c\u53ef\u80fd\u7684\u5e94\u7528\u529f\u80fd\u3002\u4e0d\u662f\u4ee5\u5b89\u5168\u4e3a\u5bfc\u5411\u5e76\u4e14\u9762\u5411\u7535\u529b\u7cfb\u7edf\uff0c\u4f46\u4ecd\u7136\u662f SCADA \u7684\u4e00\u4e2a\u5f88\u597d\u7684\u5165\u95e8\u8bfb\u7269\u3002<\/td><\/tr><tr><td><a href=\"http:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-82r2.pdf\">NIST SP 800-82\uff0c\u4fee\u8ba2\u7248 2<\/a><\/td><td>NIST \u5de5\u4e1a\u63a7\u5236\u7cfb\u7edf (ICS) \u5b89\u5168\u6307\u5357\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/www.sans.org\/reading-room\/whitepapers\/ICS\/industrial-control-system-cyber-kill-chain-36297\">\u5de5\u4e1a\u63a7\u5236\u7cfb\u7edf\u7f51\u7edc\u6740\u4f24\u94fe<\/a><\/td><td>\u8fd9\u7bc7 SANS \u8bba\u6587\u63cf\u8ff0\u4e86 ICS \u7f51\u7edc\u6740\u4f24\u94fe\u3002\u5b83\u9488\u5bf9 ICS \u7cfb\u7edf\u7684\u5178\u578b\u4e24\u9636\u6bb5\u653b\u51fb\u5b9a\u5236\u4e86\u6d1b\u514b\u5e0c\u5fb7\u00b7\u9a6c\u4e01\u516c\u53f8\u7684\u6740\u4f24\u94fe\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/ics.sans.org\/media\/An-Abbreviated-History-of-Automation-and-ICS-Cybersecurity.pdf\">\u81ea\u52a8\u5316\u3001\u5de5\u4e1a\u63a7\u5236\u7cfb\u7edf\u548c\u7f51\u7edc\u5b89\u5168\u7b80\u53f2<\/a><\/td><td>\u8fd9\u7bc7 SANS \u8bba\u6587\u7740\u773c\u4e8e ICS \u7f51\u7edc\u5b89\u5168\u7684\u80cc\u666f\u3002\u975e\u5e38\u503c\u5f97\u4e00\u8bfb\uff0c\u4ee5\u786e\u4fdd\u60a8\u4e86\u89e3\u8fc7\u53bb\u4e8c\u5341\u5e74\u4e2d\u53d1\u751f\u7684\u8bb8\u591a\u4e8b\u4ef6\u4ee5\u53ca\u5b83\u4eec\u5982\u4f55\u6fc0\u53d1\u5f53\u4eca ICS \u7684\u5b89\u5168\u6027\u3002<\/td><\/tr><tr><td><a href=\"http:\/\/www.controleng.com\/networking-security\/cyber-security.html\">\u63a7\u5236\u5de5\u7a0b-\u7f51\u7edc\u4e0e\u5b89\u5168-\u7f51\u7edc\u5b89\u5168<\/a><\/td><td>\u300a\u63a7\u5236\u5de5\u7a0b\u300b\u6742\u5fd7\u7684\u7f51\u7edc\u5b89\u5168\u65b0\u95fb\u548c\u6587\u732e\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/www.fireeye.com\/blog\/threat-research\/2019\/09\/ontology-understand-assess-operational-technology-cyber-incidents.html\">\u8fd0\u8425\u6280\u672f\u7f51\u7edc\u5b89\u5168\u4e8b\u4ef6\u672c\u4f53 (OT-CSIO)<\/a><\/td><td>OT-CSIO\u7531FireEye\u521b\u5efa\uff0c\u662f\u4e00\u4e2a\u7528\u4e8e\u7406\u89e3\u3001\u4ea4\u53c9\u6bd4\u8f83\u548c\u8bc4\u4f30\u4e0e\u8fd0\u8425\u6280\u672f\u76f8\u5173\u7684\u7f51\u7edc\u5b89\u5168\u4e8b\u4ef6\u7684\u672c\u4f53\u3002\u5b83\u4e3a\u8bc4\u4f30\u98ce\u9669\u63d0\u4f9b\u6307\u5bfc\u5e76\u5e2e\u52a9\u505a\u51fa\u660e\u667a\u7684\u51b3\u7b56\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/www.newnettechnologies.com\/downloads\/Implementation-Guide-for-ICS-using-the-CIS-Controls.pdf\">\u5de5\u4e1a\u63a7\u5236\u7cfb\u7edf CIS \u63a7\u5236\u5b9e\u65bd\u6307\u5357 &#8211; \u7248\u672c 7<\/a><\/td><td>\u672c\u6587\u6863\u63d0\u4f9b\u6709\u5173\u5982\u4f55\u5c06 CIS \u63a7\u5236\u7248\u672c 7.1 \u4e2d\u7684\u5b89\u5168\u6700\u4f73\u5b9e\u8df5\u5e94\u7528\u5230 ICS \u73af\u5883\u7684\u6307\u5357\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/www.nrdcs.lt\/file\/repository\/resources\/CIS_Controls_IoT_Companion_Guide.pdf\">CIS \u63a7\u5236\u7269\u8054\u7f51\u914d\u5957\u6307\u5357 &#8211; \u7248\u672c 7.1<\/a><\/td><td>\u672c\u6587\u4ef6\u7684\u76ee\u6807\u662f\u5728\u5404\u4e2a\u90e8\u95e8\u5177\u6709\u5e7f\u6cdb\u7684\u9002\u7528\u6027\u3002\u7269\u8054\u7f51\u5f71\u54cd\u591a\u4e2a\u9886\u57df\u7684\u6240\u6709\u8ba1\u7b97\u9886\u57df\uff0c\u4f8b\u5982\u533b\u7597\u4fdd\u5065\u3001\u822a\u7a7a\u3001\u516c\u5171\u5b89\u5168\u548c\u80fd\u6e90\u3002\u8fd9\u5bfc\u81f4\u4e86\u7279\u5b9a\u4e8e\u884c\u4e1a\u7684\u7269\u8054\u7f51\u5b89\u5168\u6307\u5357\uff0c\u4f46\u672c\u6587\u4ef6\u6709\u610f\u4e0e\u884c\u4e1a\u65e0\u5173\u3002<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"user-content-education\"><a href=\"https:\/\/github.com\/hslatman\/awesome-industrial-control-system-security#education\">\u6559\u80b2<\/a><\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><a href=\"https:\/\/github.com\/Fortiphyd\/GRFICSv2\">GRFICSv2<\/a><\/td><td>\u7b2c\u4e8c\u7248\u5de5\u4e1a\u63a7\u5236\u4eff\u771f\u56fe\u5f62\u5199\u5b9e\u6846\u67b6 (GRFICS) \u662f\u4e00\u4e2a\u771f\u5b9e\u5de5\u4e1a\u63a7\u5236\u4eff\u771f\u6846\u67b6\uff0c\u5b83\u4f7f\u7528 Unity 3D \u6e38\u620f\u5f15\u64ce\u6765\u6a21\u62df\u5de5\u4e1a\u63a7\u5236\u7cfb\u7edf\u3002GRFICS\u4e3a\u7528\u6237\u63d0\u4f9b\u4e86\u5b8c\u6574\u7684\u865a\u62df\u5de5\u4e1a\u63a7\u5236\u7cfb\u7edf\uff08ICS\uff09\u7f51\u7edc\u6765\u7ec3\u4e60\u5e38\u89c1\u7684\u653b\u51fb\uff0c\u5305\u62ec\u547d\u4ee4\u6ce8\u5165\u3001\u4e2d\u95f4\u4eba\u548c\u7f13\u51b2\u533a\u6ea2\u51fa\uff0c\u5e76\u57283D\u53ef\u89c6\u5316\u4e2d\u76f4\u89c2\u5730\u770b\u5230\u5176\u653b\u51fb\u7684\u5f71\u54cd\u3002\u7528\u6237\u8fd8\u53ef\u4ee5\u901a\u8fc7\u4f7f\u7528\u5f3a\u5927\u7684\u9632\u706b\u5899\u89c4\u5219\u5bf9\u7f51\u7edc\u8fdb\u884c\u9002\u5f53\u7684\u5206\u6bb5\uff0c\u6216\u7f16\u5199\u5165\u4fb5\u68c0\u6d4b\u89c4\u5219\u6765\u7ec3\u4e60\u9632\u5fa1\u6280\u80fd\u3002<a href=\"https:\/\/github.com\/djformby\/GRFICS\">\u7b2c\u4e00\u4e2a\u7248\u672c\u53ef\u4ee5\u5728\u8fd9\u91cc<\/a>\u627e\u5230\u3002 &nbsp; &nbsp; &nbsp; &nbsp;<\/td><\/tr><tr><td><a href=\"https:\/\/github.com\/hsainnos\/LICSTER\">\u83b1\u514b\u65af\u7279<\/a><\/td><td>LICSTER \u662f\u7528\u4e8e\u6559\u80b2\u548c\u7814\u7a76\u7684\u4f4e\u6210\u672c ICS \u5b89\u5168\u6d4b\u8bd5\u5e73\u53f0\uff0c\u65e8\u5728\u5e2e\u52a9\u5b66\u751f\u3001\u7814\u7a76\u4eba\u5458\u6216\u5bf9\u5de5\u4e1a\u5b89\u5168\u611f\u5174\u8da3\u7684\u4efb\u4f55\u4eba\u8bbe\u7f6e\u6700\u5c0f\u3001\u4f4e\u6210\u672c\u7684\u5de5\u4e1a\u63a7\u5236\u7cfb\u7edf (ICS) \u6d4b\u8bd5\u3002\u8be5\u9879\u76ee\u5305\u542b\u4e00\u7cfb\u5217\u53ef\u7528\u4e8e\u6784\u5efa\u7b80\u7ea6 ICS \u7684\u7ecf\u6d4e\u5b9e\u60e0\u7684\u786c\u4ef6\u3001\u7528\u4e8e\u5b9e\u4f8b\u5316\u7cfb\u7edf\u7684\u8bf4\u660e\u3001\u914d\u7f6e\u548c\u5b89\u88c5\u811a\u672c\u4ee5\u53ca\u5404\u79cd\u653b\u51fb\u573a\u666f\u53ca\u5176\u5f71\u54cd\u3002<a href=\"https:\/\/arxiv.org\/abs\/1910.00303\">\u8be5\u8bba\u6587\u53ef\u4ee5\u5728\u8fd9\u91cc<\/a>\u627e\u5230\u3002 &nbsp; &nbsp; &nbsp; &nbsp;<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"user-content-introduction-to-ics-scada--plcs\"><a href=\"https:\/\/github.com\/hslatman\/awesome-industrial-control-system-security#introduction-to-ics-scada--plcs\">ICS\u3001SCADA \u548c PLC \u7b80\u4ecb<\/a><\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><a href=\"http:\/\/plc-training.org\/plc-network-to-hmi-scada.html\">PLC\u57f9\u8bad\u7ec4\u7ec7<\/a><\/td><td>\u7ad9\u70b9\u7ec4\u7ec7\u4e86\u4e0e PLC \u57f9\u8bad\u76f4\u81f3 SCADA \u7cfb\u7edf\u76f8\u5173\u7684\u6240\u6709\u57fa\u672c\u4e3b\u9898\u3002\u867d\u7136\u5b89\u5168\u6027\u4ea4\u7ec7\u5728 10 \u4e2a\u5b66\u4e60\u9636\u6bb5\u4e2d\uff0c\u4f46\u5bf9\u4e8e\u521a\u521a\u8d77\u6b65\u7684\u4eba\u6765\u8bf4\uff0c\u8fd9\u662f\u8be5\u7f51\u7ad9\u4e0a\u4e00\u7bc7\u5f88\u68d2\u7684\u5b89\u5168\u6027\u6587\u7ae0\u3002 &nbsp; &nbsp; &nbsp; &nbsp;<\/td><\/tr><tr><td><a href=\"https:\/\/www.youtube.com\/watch?v=VQLRVjEFRGI\">\u63a7\u5236\u7cfb\u7edf\u57fa\u7840\u77e5\u8bc6<\/a><\/td><td>YouTube \u89c6\u9891\u89e3\u91ca\u4e86\u63a7\u5236\u7cfb\u7edf\u57fa\u7840\u77e5\u8bc6\uff0c\u5305\u62ec\u8fd9\u4e9b\u7cfb\u7edf\u7528\u4e8e\u611f\u77e5\u548c\u521b\u5efa\u7269\u7406\u53d8\u5316\u4ee5\u91c7\u53d6\u884c\u52a8\u7684\u903b\u8f91\u7c7b\u578b\u3002 &nbsp; &nbsp; &nbsp; &nbsp;<\/td><\/tr><tr><td><a href=\"https:\/\/www.youtube.com\/watch?v=vv2CoTiaWPI\">SCADA \u7cfb\u7edf &#8211; Rusty Wiliiams \u7684\u5b9e\u7528\u7a0b\u5e8f 101 \u4f1a\u8bdd<\/a><\/td><td>\u516c\u7528\u4e8b\u4e1a\u884c\u4e1a\u4e13\u4e1a\u4eba\u58eb Rusty Williams \u4ece\u7535\u529b\u516c\u7528\u4e8b\u4e1a\u7684\u89d2\u5ea6\u89e3\u91ca\u4e86 SCADA\u3002 &nbsp; &nbsp; &nbsp; &nbsp;<\/td><\/tr><tr><td><a href=\"https:\/\/www.youtube.com\/user\/ControlLectures\">\u63a7\u5236\u7cfb\u7edf\u8bb2\u5ea7<\/a><\/td><td>Brian Douglas YouTube \u89c6\u9891\u7cfb\u5217\uff0c\u4ed6\u4ee5\u975e\u5e38\u6613\u4e8e\u5904\u7406\u7684\u65b9\u5f0f\u6db5\u76d6\u4e86\u6709\u5173\u63a7\u5236\u7cfb\u7edf\u7684\u5e7f\u6cdb\u4e3b\u9898\u3002 &nbsp; &nbsp; &nbsp; &nbsp;<\/td><\/tr><tr><td><a href=\"https:\/\/www.youtube.com\/user\/plcprofessor\">PLC\u6559\u6388<\/a><\/td><td>PLC \u6559\u6388\u53ca\u5176\u7f51\u7ad9 plcprofessor.com \u5305\u542b\u5927\u91cf\u4f18\u8d28\u8d44\u6e90\uff0c\u53ef\u7528\u4e8e\u4e86\u89e3\u4ec0\u4e48\u662f\u53ef\u7f16\u7a0b\u903b\u8f91\u63a7\u5236\u5668 (PLC) \u548c\u5176\u4ed6\u7c7b\u578b\u7684\u63a7\u5236\u7cfb\u7edf\u53ca\u5176\u903b\u8f91\u4ee5\u53ca\u5b83\u4eec\u7684\u5de5\u4f5c\u539f\u7406\u3002 &nbsp; &nbsp; &nbsp; &nbsp;<\/td><\/tr><tr><td><a href=\"https:\/\/www.youtube.com\/watch?v=2DQdEHvnqvI\">\u4e32\u884c\u901a\u4fe1 RS232 \u548c RS485<\/a><\/td><td>Real Time Automation \u7684 John Rinaldi \u63cf\u8ff0\u4e86\u4e32\u884c\u901a\u4fe1 RS232 \u548c RS485\u3002 &nbsp; &nbsp; &nbsp; &nbsp;<\/td><\/tr><tr><td><a href=\"https:\/\/www.youtube.com\/watch?v=OvRD2UvrHjE\">\u5173\u4e8e MODBUS-RTU \u60a8\u9700\u8981\u4e86\u89e3\u7684\u4e00\u5207<\/a><\/td><td>\u5b9e\u65f6\u81ea\u52a8\u5316\u516c\u53f8\u7684 John Rinaldi \u63cf\u8ff0\u4e86 MODBUS-RTU\u3002 &nbsp; &nbsp; &nbsp; &nbsp;<\/td><\/tr><tr><td><a href=\"https:\/\/www.youtube.com\/watch?v=8FYFai21JPA\">MODBUS \u6570\u636e\u7ed3\u6784<\/a><\/td><td>Real Time Automation \u7684 John Rinaldi \u63cf\u8ff0\u4e86 MODBUS \u6570\u636e\u7ed3\u6784\u3002 &nbsp; &nbsp; &nbsp; &nbsp;<\/td><\/tr><tr><td><a href=\"https:\/\/www.youtube.com\/watch?v=E1nsgukeKKA\">\u5173\u4e8e MODBUS-TCP \u60a8\u9700\u8981\u4e86\u89e3\u7684\u4e00\u5207<\/a><\/td><td>Real Time Automation \u7684 John Rinaldi \u63cf\u8ff0\u4e86 MODBUS-TCP\u3002 &nbsp; &nbsp; &nbsp; &nbsp;<\/td><\/tr><tr><td><a href=\"https:\/\/www.youtube.com\/watch?v=DL_zIjhCEpU\">\u5de5\u4e1a\u534f\u8bae\u5982\u4f55\u4f7f\u7528\u4ee5\u592a\u7f51 TCP\/IP<\/a><\/td><td>Real Time Automation \u7684 John Rinaldi \u63cf\u8ff0\u4e86\u4ee5\u592a\u7f51 TCP\/IP\u3002 &nbsp; &nbsp; &nbsp; &nbsp;<\/td><\/tr><tr><td><a href=\"https:\/\/www.youtube.com\/channel\/UCUKKQwBQZczpYzETkZNxi-w\">\u5b9e\u6570<\/a><\/td><td>RealPars YouTube \u9891\u9053\u6709\u8bb8\u591a\u6709\u5173\u5de5\u4e1a\u81ea\u52a8\u5316\u548c PLC \u7f16\u7a0b\u7684\u89c6\u9891\u3002 &nbsp; &nbsp;<\/td><\/tr><\/tbody><\/table><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>SCADA : https:\/\/github.com\/topics\/scada SCADA 1\uff09 Conpot [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-510","post","type-post","status-publish","format-standard","hentry","category-gongye"],"blocksy_meta":"","_links":{"self":[{"href":"http:\/\/ai.gitpp.com\/index.php\/wp-json\/wp\/v2\/posts\/510","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/ai.gitpp.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/ai.gitpp.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/ai.gitpp.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/ai.gitpp.com\/index.php\/wp-json\/wp\/v2\/comments?post=510"}],"version-history":[{"count":3,"href":"http:\/\/ai.gitpp.com\/index.php\/wp-json\/wp\/v2\/posts\/510\/revisions"}],"predecessor-version":[{"id":580,"href":"http:\/\/ai.gitpp.com\/index.php\/wp-json\/wp\/v2\/posts\/510\/revisions\/580"}],"wp:attachment":[{"href":"http:\/\/ai.gitpp.com\/index.php\/wp-json\/wp\/v2\/media?parent=510"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/ai.gitpp.com\/index.php\/wp-json\/wp\/v2\/categories?post=510"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/ai.gitpp.com\/index.php\/wp-json\/wp\/v2\/tags?post=510"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}