The industrial control system (ICS) used in this scenario simulates an environment that might be used to cool industrial equipment. The ICS is made up of five systems. The first system contains a tank, tank level sensor and a water pump. The second system is a programmable logic controller (PLC) which controls the water pump based on the level of water found in the attached tank. The third system is an Open Platform Communications (OPC) server which accesses and modifies data found on the PLC. The fourth system is running Human Machine Interface (HMI) software which communicates with the OPC server to provide a human system operator with system statistics and control. The final system in the ICS is a security appliance that provides routing and firewall services for all systems.
This scenario also make use of a system running Kali Linux. In this lab the virtual network switch is configured so that the Kail system receives all data transmitted. (Network diagram)
In this lab students will use nmap to perform basic and advanced network scanning. Multiple methods for accessing common built-in nmap resources will be demonstrated. Students will learn to modify nmap's behavior using switches. Students will learn to use caution when using nmap by observing how it can disrupt system functionality.
Part 1
Install Systems
In this part of the lab you are going to install and configure the systems needed to complete the lab.
After the import has completed access the Settings for the Security Appliance virtual machine and change its configuration so that it is bridged to the network device in your host computer.
Power on the systems in the following order:
Security Appliance
Sensor
PLC
OPC
HMI
Kali
Part 2
Practice Nmap Basics
In this part of the lab you are going to practice basic nmap use.
Access the Kali system.
At the login screen enter student into the Enter your username field and Password01 into the Enter your password field.
Click the Log In button.
Open a terminal (command prompt) window by clicking the Terminal Emulator button found at the upper left hand corner of the window ( Example ).
Use nmap to perform a default scan of the PLC system by typing the command sudo nmap 10.0.255.102 ( Example ).
If when using sudo, you are prompted to authenticate type in the password Password01 followed by the <ENTER> key.
Type the command ip address show to view the basic network configuration of the Kali system ( Example ).
Type the command sudo nmap 10.0.255.1-255 to perform a default scan of all of the systems on the same network as the Kali system.
Record the amount of time that the default scan took and the number of systems found in the Lab Form found here.
Part 3
Use switches with Nmap
In this part of the lab you will practice using nmap switches.
Type the command nmap --help to view the switches available to the nmap program.
Type the command man nmap to view the online manual for the nmap program.
Type the q key on the keyboard when you are finished viewing the manual.
Type the command sudo nmap -sn 10.0.255.0/24 to perform a ping scan of all of the systems on the same network as the Kali system.
Record the amount of time that the ping scan took and the number of systems found in the Lab Form found here.
Type the command sudo nmap -sn -oN nmap-scan.txt 10.0.255.0/24 to perform a ping scan of all of the systems on the same network as the Kali system and save the results to a text file named nmap-scan.txt.
Type the command cat nmap-scan.txt to verify that the nmap-scan.txt file exists and contains the results of the scan.
Type the command sudo nmap -T5 10.0.255.0/24 to perform a fast (insanely fast) scan of all of the systems on the same network as the Kali system.
Record the amount of time that the fast scan took and the number of systems found in the Lab Form found here.
Type the command sudo nmap -A 10.0.255.101 to scan the HMI system's operating system and service details.
Type the command sudo nmap -A localhost to scan the local (Kali) system's operating system and service details.
Type the command sudo nmap 10.0.255.102 to perform a default scan of the PLC system.
Note that the default settings do not scan for the Modbus server/client which runs on TCP port 502.
Type the command sudo nmap -p 502 10.0.255.102 to scan the Modbus port on the PLC system.
Type the command sudo nmap --script banner 10.0.255.102 to execute the banner script targeting the PLC system.
NOTE: The banner script connects to the target then prints any text received (banner).
NOTE: Nmap scripts can be found by default in the /usr/share/nmap/scripts directory on a Kali system.
Type the command sudo nmap --script-help plc-caution to display the help documentation for the plc-caution script.
Type the command sudo nmap --script plc-caution 10.0.255.102 to execute the plc-caution script targeting the PLC system.
Access the PLC system and answer the question regarding its current functional state in the Lab Form found here.
Part 4
Challenge
In this part of the lab you will use what you have learned to answer some challenge questions.
Use nmap to determine the IP address of the system which has the NetBIOS computer name OPC\x00.
Record the answer to the question in the Lab Form found here.
Two systems on the same network as the Kali system are listening on the Modbus protocol port (TCP port 502), use nmap to determine what their IP addresses are.
Record the answer to the question in the Lab Form found here.