CN104468267B - A kind of electrical power distribution automatization system information security penetration testing method - Google Patents
A kind of electrical power distribution automatization system information security penetration testing method Download PDFInfo
- Publication number
- CN104468267B CN104468267B CN201410680264.6A CN201410680264A CN104468267B CN 104468267 B CN104468267 B CN 104468267B CN 201410680264 A CN201410680264 A CN 201410680264A CN 104468267 B CN104468267 B CN 104468267B
- Authority
- CN
- China
- Prior art keywords
- penetration testing
- network
- information
- test
- testing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000012360 testing method Methods 0.000 title claims abstract description 225
- 230000035515 penetration Effects 0.000 title claims abstract description 133
- 230000006854 communication Effects 0.000 claims abstract description 31
- 238000004891 communication Methods 0.000 claims abstract description 30
- 238000000034 method Methods 0.000 claims abstract description 24
- 238000005516 engineering process Methods 0.000 claims abstract description 18
- 238000004458 analytical method Methods 0.000 claims abstract description 8
- 238000012423 maintenance Methods 0.000 claims abstract description 6
- 230000007812 deficiency Effects 0.000 claims abstract description 5
- 230000005540 biological transmission Effects 0.000 claims description 30
- 238000001514 detection method Methods 0.000 claims description 13
- 230000008859 change Effects 0.000 claims description 12
- 238000010998 test method Methods 0.000 claims description 8
- 230000004044 response Effects 0.000 claims description 5
- 238000004519 manufacturing process Methods 0.000 claims description 4
- 230000004083 survival effect Effects 0.000 claims description 4
- 238000010200 validation analysis Methods 0.000 claims description 3
- RTZKZFJDLAIYFH-UHFFFAOYSA-N Diethyl ether Chemical compound CCOCC RTZKZFJDLAIYFH-UHFFFAOYSA-N 0.000 claims 2
- 230000008595 infiltration Effects 0.000 claims 1
- 238000001764 infiltration Methods 0.000 claims 1
- 238000005259 measurement Methods 0.000 abstract description 3
- 238000012502 risk assessment Methods 0.000 abstract description 3
- 230000006855 networking Effects 0.000 abstract description 2
- 238000002955 isolation Methods 0.000 description 3
- 230000003139 buffering effect Effects 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 239000012466 permeate Substances 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 238000011160 research Methods 0.000 description 2
- 241000700605 Viruses Species 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 235000000332 black box Nutrition 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 239000000686 essence Substances 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000009545 invasion Effects 0.000 description 1
- 238000011835 investigation Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000009738 saturating Methods 0.000 description 1
- 238000004088 simulation Methods 0.000 description 1
- 238000013522 software testing Methods 0.000 description 1
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims (1)
- A kind of 1. electrical power distribution automatization system information security penetration testing method, it is characterised in that the electrical power distribution automatization system information Safe penetration method of testing utilizes information system fragility penetration testing technology, including:Electric automation system information is collected, port Scanning, password guess, long-range spilling, local spilling, script test and privilege-escalation, by the attack method of analog hacker, come Assess electrical power distribution automatization system security, including to main station system, communication line, distribution terminal any weakness, technological deficiency Or the active analysis of leak, specifically include:Step 1, penetration testing is carried out to main station system;Step 2, penetration testing is carried out to distribution network terminal;Step 3, penetration testing is carried out to communication port;In step 1, the concrete methods of realizing that penetration testing is carried out to main station system is:Test scope delimited, SCADA servers, FES servers, WEB server delimited into the scope for target network environment, really Location survey examination content, method of testing, test condition, test target;Using various public resources, the information for being related to test target is obtained;Position network state, operating system and the Relative Network framework of target;The port of all openings in goal systems is found out, the service currently run is enumerated by open port;By the high background information of individual mailbox, telephone number, conventional user account, reliability, it is fabricated to more meaningful weak mouth Dictionary is made, carries out weak passwurd scanning;Leak is found by combining automatically and manually two kinds of different method of testings;Using leak, goal systems is permeated by existing vulnerability exploit program;Tester lifts the authority of oneself using the local leak of current system environment, obtains superuser right or is Irrespective of size authority;Using various public resources, when acquisition is related to the information of test target, the information on test target is from internet Collect, related data is obtained from various search engines or collects useful letter using the instrument maintenance data digging technology of specialty Breath;In step 2, the concrete methods of realizing that penetration testing is carried out to distribution network terminal is:Information search is tested, and penetration testing engineer inquires keeper's bus structures, protocol type, assets important level information, Network sweep is carried out using specialized protocol addressing software, survival terminal and terminal address in industry control network is understood, enters row information Collect test;Gathering system leak, penetration testing engineer are beautiful in www.us-cert.gov/control_systems/ics-cert/ The safety-related specialty of industrial control system Information Security Incident Response group of state website, www.scadahacker.com industry controls Newest vulnerability information, special programing system leak are searched by forum;Vulnerability scanning, penetration testing engineer carry out vulnerability scanning to the next machine equipment by using plug-in unit, find known bugs And the leak order of severity;Firmware leak is collected, the leakage of query facility in the security bulletin that penetration testing engineer passes through the next machine equipment production firm Hole information and latest firmware version, by contrast the next machine equipment whether upgraded in time renewal to newest firmware version come Determine the presence of leak;Vulnerability exploit is tested, and penetration testing engineer writes slave computer vulnerability exploit program using METASPOLOIT instruments, to leakage The seriousness in hole carries out test and validation;Code tester is downloaded, penetration testing engineer understands terminal device by special programming software or order debugging software Facilities, such as whether allowing source code to download, whether allowing compiled code to download, whether be encrypted, whether can to code Enough long-range reading information;Upload code is tested, and penetration testing engineer is adjusted using the engineer station forged using programing system software or order Try software and firmware upgrade or code update are carried out to terminal, testing whether being capable of the new code of successful execution;Slave computer instruction testing, penetration testing engineering use SNIFFER ingress-only packet sniffings software capture data link layer, network Layer, transport layer, application layer net obtain terminal transmission data, check packet content using protocol analyzer and send address and mesh Address, change its data, resend, check whether substation receives and perform;Host computer instruction testing, penetration testing engineering use SNIFFER ingress-only packet sniffings software capture data link layer, network Layer, transport layer, application layer net obtain host computer transmission data, check command content using protocol analyzer and send address and original Address, the instruction of its main website is changed, forge instruction of the host computer to slave computer, check whether substation receives and perform;Refusing service testing, penetration testing engineer fills the data buffer zone of slave station by sending substantial amounts of broadcasting packet, Slave station can not be normally received the data of main website transmission;In step 3, the concrete methods of realizing that penetration testing is carried out to communication port is:Network test is connected, and penetration testing engineer uses Wired access mode, testing tool accessed by industrial switch Industrial control system network or using wireless access way, by searching wireless network signal, access industrial control system net Network;Wireless network strength is tested, and penetration testing engineer is by the wireless crack tools of BT, to WEP, WPA, WPA2, AES, DES Cracked, obtain encryption key, and then with legal identity access industrial Control System NetWork;The test of network equipment leak is collected, penetration testing engineer, such as the firmware of industrial switch, looks into by checking the network equipment See whether be latest edition, and newest leakage is searched by the safety-related professional forum of www.scadahacker.com industry controls Hole information;Network equipment detection is controlled, penetration testing engineer attempts to log in management by using the mode of weak passwurd and Brute Force Member's account, by obtaining administrator right, is modified to the configuration information of the network equipment;Such as change port information, the network segment every From information, device address, reach and interrupt session, pretend to be main website to test;Monitor message test, penetration testing engineering using SNIFFER ingress-only packet sniffings software capture data link layer, Internet, Transport layer, application layer net obtain terminal transmission data, using specialized protocol analyzer check packet content and send address and Destination address;Change message test, the packet that penetration testing project analysis obtains, change the transmission address of packet, destination address, Data content, then packet is sent again,Refusing service testing, penetration testing engineer fills the data buffer zone of slave station by sending substantial amounts of broadcasting packet, Slave station can not be normally received the data of main website transmission, or restart the network equipment, interrupt BlueDrama, cause network to be refused Service;The electrical power distribution automatization system information security penetration testing method is used for the infiltration of main station system, communication port, distribution network terminal Test, the main station system are communicated to connect by the communication port and the distribution network terminal, and the communication port includes ether Net, GPRS, the distribution network terminal include distribution network terminal DTU, distribution network terminal FTU, distribution network terminal DTU/FTU.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410680264.6A CN104468267B (en) | 2014-11-24 | 2014-11-24 | A kind of electrical power distribution automatization system information security penetration testing method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410680264.6A CN104468267B (en) | 2014-11-24 | 2014-11-24 | A kind of electrical power distribution automatization system information security penetration testing method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104468267A CN104468267A (en) | 2015-03-25 |
CN104468267B true CN104468267B (en) | 2017-12-12 |
Family
ID=52913674
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410680264.6A Active CN104468267B (en) | 2014-11-24 | 2014-11-24 | A kind of electrical power distribution automatization system information security penetration testing method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104468267B (en) |
Families Citing this family (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105975863A (en) * | 2016-04-27 | 2016-09-28 | 国网天津市电力公司 | Method for evaluating and calculating information security risk of power distribution automation terminal equipment |
CN106470214B (en) * | 2016-10-21 | 2020-03-06 | 杭州迪普科技股份有限公司 | Attack detection method and device |
CN106603507A (en) * | 2016-11-29 | 2017-04-26 | 哈尔滨安天科技股份有限公司 | Method and system for automatically completing network security self checking |
CN106713284A (en) * | 2016-12-02 | 2017-05-24 | 国网浙江省电力公司电力科学研究院 | Industrial control security testing system, and industrial control system |
CN107134778A (en) * | 2017-07-03 | 2017-09-05 | 湖南工业大学 | Based on internet DC voltage automatic adjusument APF current predictive control methods |
CN107888598B (en) * | 2017-11-17 | 2020-08-11 | 中广核工程有限公司 | Nuclear power station electrical secondary system information safety risk evaluation system and method |
CN108173832A (en) * | 2017-12-25 | 2018-06-15 | 四川长虹电器股份有限公司 | Family's Internet of Things application system penetration testing method based on end cloud translocation |
CN108234525A (en) * | 2018-03-30 | 2018-06-29 | 阜阳职业技术学院 | A kind of information leakage preventing theft protection management system in computer network security |
CN108665400A (en) * | 2018-04-28 | 2018-10-16 | 湖南城市学院 | A kind of planning of urban and rural management case system |
CN108737417A (en) * | 2018-05-16 | 2018-11-02 | 南京大学 | A kind of vulnerability checking method towards industrial control system |
CN108809951A (en) * | 2018-05-16 | 2018-11-13 | 南京大学 | A kind of penetration testing frame suitable for industrial control system |
CN108769022B (en) * | 2018-05-29 | 2020-05-19 | 浙江大学 | Industrial control system safety experiment system for penetration test |
CN109040086B (en) * | 2018-08-15 | 2020-11-03 | 广东电网有限责任公司 | Industrial control system DDOS attack simulation method and device |
CN109561077B (en) * | 2018-11-08 | 2021-01-12 | 广西电网有限责任公司电力科学研究院 | Acquisition terminal communication safety evaluation method and device |
CN109543301A (en) * | 2018-11-22 | 2019-03-29 | 苏州健雄职业技术学院 | A kind of network security attacks prototype modeling method based on Industry Control |
CN110033174A (en) * | 2019-03-20 | 2019-07-19 | 烽台科技(北京)有限公司 | A kind of industrial information efficient public security system building method |
CN110086806B (en) * | 2019-04-26 | 2020-04-14 | 中国南方电网有限责任公司 | Scanning system for plant station equipment system bugs |
CN110399718B (en) * | 2019-06-04 | 2023-01-20 | 哈尔滨工业大学(威海) | Remote penetration evidence obtaining method for industrial control system |
CN110221980A (en) * | 2019-06-17 | 2019-09-10 | 南京未来产业大数据研究院有限公司 | Information system and its method for penetration testing and loophole reparation |
CN110505116A (en) * | 2019-07-30 | 2019-11-26 | 国网陕西省电力公司 | Power information acquisition system and penetration test method, device, readable storage medium storing program for executing |
CN110677381B (en) * | 2019-08-14 | 2023-05-09 | 奇安信科技集团股份有限公司 | Penetration test method and device, storage medium and electronic device |
CN110688313B (en) * | 2019-09-26 | 2022-11-18 | 天津津航计算技术研究所 | Fault injection method for software testing under VxWorks operating system |
CN111157833B (en) * | 2019-10-15 | 2022-09-13 | 国网山东省电力公司电力科学研究院 | Power distribution terminal safety detection system and method based on automatic operation of assembly line |
CN111026012B (en) * | 2019-11-29 | 2023-01-31 | 安天科技集团股份有限公司 | Method and device for detecting PLC firmware level bugs, electronic equipment and storage medium |
CN111027074B (en) * | 2019-12-05 | 2022-03-15 | 国网浙江省电力有限公司电力科学研究院 | Vulnerability automatic utilization method and system |
CN111090864B (en) * | 2019-12-12 | 2022-07-12 | 中国信息安全测评中心 | Penetration test frame system, penetration test platform and penetration test method |
CN111062040A (en) * | 2019-12-19 | 2020-04-24 | 成都烽创科技有限公司 | Method for determining unknown vulnerability, server and computer readable storage medium |
CN112398829A (en) * | 2020-11-04 | 2021-02-23 | 国网辽宁省电力有限公司电力科学研究院 | Network attack simulation method and system for power system |
CN112749086A (en) * | 2021-01-12 | 2021-05-04 | 国网重庆市电力公司营销服务中心 | Method for evaluating and analyzing reliability of metering equipment software |
CN113934411B (en) * | 2021-11-24 | 2024-11-08 | 南京邮电大学 | Automatic penetration test method for industrial control terminal equipment |
CN114598509B (en) * | 2022-02-23 | 2023-06-20 | 烽台科技(北京)有限公司 | Method and device for determining vulnerability result |
CN115801634B (en) * | 2022-12-01 | 2023-06-16 | 北京安帝科技有限公司 | Network test system based on industrial Internet security |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2011086527A1 (en) * | 2010-01-14 | 2011-07-21 | Extrasolution S.R.L. | Apparatus and method for automatic positioning cigarette paper and measuring its permeability |
CN102468985A (en) * | 2010-11-01 | 2012-05-23 | 北京神州绿盟信息安全科技股份有限公司 | Method and system for performing penetration test on network security equipment |
CN103903187A (en) * | 2014-03-07 | 2014-07-02 | 国家电网公司 | Fast detection method for potential safety hazards of power distribution automation system information |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104009881B (en) * | 2013-02-27 | 2017-12-19 | 广东电网公司信息中心 | A kind of method and device of system penetration testing |
-
2014
- 2014-11-24 CN CN201410680264.6A patent/CN104468267B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2011086527A1 (en) * | 2010-01-14 | 2011-07-21 | Extrasolution S.R.L. | Apparatus and method for automatic positioning cigarette paper and measuring its permeability |
CN102468985A (en) * | 2010-11-01 | 2012-05-23 | 北京神州绿盟信息安全科技股份有限公司 | Method and system for performing penetration test on network security equipment |
CN103903187A (en) * | 2014-03-07 | 2014-07-02 | 国家电网公司 | Fast detection method for potential safety hazards of power distribution automation system information |
Also Published As
Publication number | Publication date |
---|---|
CN104468267A (en) | 2015-03-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104468267B (en) | A kind of electrical power distribution automatization system information security penetration testing method | |
CN104009881B (en) | A kind of method and device of system penetration testing | |
Yang et al. | Man-in-the-middle attack test-bed investigating cyber-security vulnerabilities in smart grid SCADA systems | |
Lin et al. | Cyber attack and defense on industry control systems | |
CN106828362B (en) | Safety testing method and device for automobile information | |
CN104363236A (en) | Automatic vulnerability validation method | |
CN106817363B (en) | Intelligent ammeter abnormity detection method based on neural network | |
CN111600857A (en) | Account number maintenance system of data center | |
CN102724208B (en) | For controlling the system and method for the access to Internet resources | |
CN103903187A (en) | Fast detection method for potential safety hazards of power distribution automation system information | |
CN105450442A (en) | Network topology checking method and system thereof | |
CN105827642A (en) | Automatic penetration testing method and system | |
CN109344624A (en) | Penetration test method, platform, equipment and storage medium based on cloud cooperation | |
CN113901475A (en) | Fuzzy mining method for input verification vulnerability of industrial control terminal equipment | |
CN109063486B (en) | Safety penetration testing method and system based on PLC equipment fingerprint identification | |
CN112906011B (en) | Vulnerability discovery method, testing method, security testing method, related device and platform | |
CN111510463B (en) | Abnormal behavior recognition system | |
CN105975863A (en) | Method for evaluating and calculating information security risk of power distribution automation terminal equipment | |
CN113315767A (en) | Electric power Internet of things equipment safety detection system and method | |
CN107545636A (en) | Optical cross box smart lock control method, apparatus and its system based on Bluetooth communication | |
Xiong et al. | A vulnerability detecting method for Modbus-TCP based on smart fuzzing mechanism | |
CN115361203A (en) | Vulnerability analysis method based on distributed scanning engine | |
CN108965251A (en) | A kind of safe mobile phone guard system that cloud combines | |
Jiwen et al. | Cyber security vulnerability assessment for Smart substations | |
CN112615848B (en) | Vulnerability repair state detection method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
CB03 | Change of inventor or designer information | ||
CB03 | Change of inventor or designer information |
Inventor after: Chen Liang Inventor after: Shi Wei Inventor after: Tang Ping Inventor after: Xie Hao Inventor after: Li Zhibin Inventor after: Huang Gang Inventor after: Li Xiaohui Inventor after: Gong Chenghu Inventor after: Zhao Jing Inventor after: Wang Kan Inventor after: Liang Ruihong Inventor after: Lin Yongfeng Inventor after: Zhang Guoqiang Inventor after: Yin Bo Inventor after: Wang Jianfeng Inventor after: Xiang Tianchun Inventor after: Li Guodong Inventor after: Li Jie Inventor after: Cui Jie Inventor before: Chen Liang Inventor before: Lin Yongfeng Inventor before: Zhang Guoqiang Inventor before: Tang Ping Inventor before: Li Xiaohui Inventor before: Gong Chenghu |
|
GR01 | Patent grant | ||
GR01 | Patent grant |