Skip to content

Content: New Industrial SCADA Lab – ESP32 #4

@arn-c0de

Description

@arn-c0de

Red-Team Focused | Version 2.0

Realistic mini-SCADA on ESP32 – students learn by attacking and defending it
4 production lines • 20+ sensors/actuators • physically plausible behavior

6 main exploit paths (can be toggled independently):

  1. IDOR (unauthorized object access)
  2. Command / Parameter Injection
  3. Race Condition
  4. Physics / process anomaly exploitation
  5. Forensics (log & state reconstruction)
  6. Weak credentials / credential leakage

Learning style
Attack → understand → adapt
Discovery-based, not spoon-fed

Difficulty levels

  • EASY: lots of hints, almost no defense
  • NORMAL: hints on request, moderate incidents
  • HARD: almost no help, active defense, cascading failures

Highlights

  • Nice live P&ID-style dashboard
  • Real-time trends + alarms
  • Dynamic incidents (stuck valve → temp rise → overload …)
  • Leaderboard (exploits found + time)
  • Teacher controls via serial: IP block, rate-limit, session kill

Target audience

  • ICS/OT security beginners to advanced
  • Pentesters who want to understand industrial systems

Metadata

Metadata

Assignees

Labels

enhancementNew feature or request

Projects

Status

In review

Relationships

None yet

Development

No branches or pull requests

Issue actions