Welcome back, my aspiring SCADA/ICS cyberwarriors!
SCADA (Supervisory Control and Data Acquisition) systems and the wider class of industrial control systems (ICS) run many parts of modern life, such as electricity, water, transport, factories. These systems were originally built to work in closed environments and not to be exposed to the public Internet. Over the last decade they have been connected more and more to corporate networks and remote services to improve efficiency and monitoring. That change has also made them reachable by the same attackers who target regular IT systems. When a SCADA system is hit by malware, sabotage, or human error, operators must restore service fast. At the same time investigators need trustworthy evidence to find out what happened and to support legal, regulatory, or insurance processes.
Forensics techniques from traditional IT are helpful, but they usually do not fit SCADA devices directly. Many field controllers run custom or minimal operating systems, lack detailed logs, and expose few of the standard interfaces that desktop forensics relies on. To address that gap, we are starting a focused, practical 3-day course on SCADA forensics. The course is designed to equip you with hands-on skills for collecting, preserving and analysing evidence from PLCs, RTUs, HMIs and engineering workstations.
Today we will explain how SCADA systems are built, what makes forensics in that space hard, and which practical approaches and tools investigators can use nowadays.
Background and SCADA Architecture
A SCADA environment usually has three main parts: the control center, the network that connects things, and the field devices.
The control center contains servers that run the supervisory applications, databases or historians that store measurement data, and operator screens (human-machine interfaces). These hosts look more like regular IT systems and are usually the easiest place to start a forensic investigation.
The network between control center and field devices is varied. It can include Ethernet, serial links, cellular radios, or specialized industrial buses. Protocols range from simple serial messages to industrial Ethernet and protocol stacks that are unique to vendors. That variety makes it harder to collect and interpret network traffic consistently.
Field devices sit at the edge. They include PLCs (programmable logic controllers), RTUs (remote terminal units), and other embedded controllers that handle sensors and actuators. Many of these devices run stripped-down or proprietary firmware, hold little storage, and are designed to operate continuously.
Understanding these layers helps set realistic expectations for what evidence is available and how to collect it without stopping critical operations.
Challenges in SCADA Forensics
SCADA forensics has specific challenges that change how an investigation is done.
First, some field devices are not built for forensics. They often lack detailed logs, have limited storage, and run proprietary software. That makes it hard to find recorded events or to run standard acquisition tools on the device.
Second, availability matters. Many SCADA devices must stay online to keep a plant, substation, or waterworks operating. Investigators cannot simply shut everything down to image drives. This requirement forces use of live-acquisition techniques that gather volatile data while systems keep running.
Third, timing and synchronization are difficult. Distributed devices often have different clocks and can drift. That makes correlating events across a wide system challenging unless timestamps are synchronized or corrected during analysis.
Finally, organizational and legal issues interfere. Companies often reluctant to share device details, firmware, or incident records because of safety, reputation, or legal concerns. That slows development of general-purpose tools and slows learning from real incidents.
All these challenges only increase the value of SCADA forensics specialists. Salary varies by location, experience, and roles, but can range from approximately $65,000 to over $120,000 per year.
Real-world attack chain
To understand why SCADA forensics matters, it helps to look at how real incidents unfold. The following examples show how a single compromise inside the corporate network can quickly spread into the operational side of a company. In both cases, the attack starts with the compromise of an HR employeeβs workstation, which is a common low-privilege entry point. From there, the attacker begins basic domain reconnaissance, such as mapping users, groups, servers, and RDP access paths.Β
Case 1
In the first path, the attacker discovers that the compromised account has the right to replicate directory data, similar to a DCSync privilege. That allows the extraction of domain administrator credentials. Once the attacker holds domain admin rights, they use Group Policy to push a task or service that creates a persistent connection to their command-and-control server. From that moment, they can access nearly every machine in the domain without resistance. With such reach, pivoting into the SCADA or engineering network becomes a matter of time. In one real scenario, this setup lasted only weeks before attackers gained full control and eventually destroyed the domain.
Case 2
The second path shows a different but equally dangerous route. After gathering domain information, the attacker finds that the HR account has RDP access to a BACKUP server, which stores local administrator hashes. They use these hashes to move laterally, discovering that most domain users also have RDP access through an RDG gateway that connects to multiple workstations. From there, they hop across endpoints, including those used by engineers. Once inside engineering workstations, the attacker maps out routes to the industrial control network and starts interacting with devices by changing configurations, altering setpoints, or pushing malicious logic into PLCs.
Both cases end with full access to SCADA and industrial equipment. The common causes are poor segmentation between IT and OT, excessive privileges, and weak monitoring.
Frameworks and Methodologies
A practical framework for SCADA forensics has to preserve evidence and keep the process safe. The basic idea is to capture the most fragile, meaningful data first and leave more invasive actions for later or for offline testing.
Start with clear roles and priorities. You need to know who can order device changes, who will gather evidence, and who is responsible for restoring service. Communication between operations and security must be planned ahead of incidents.
As previously said, capture volatile and remote evidence first, then persistent local data. This includes memory contents, current register values, and anything stored only in RAM. Remote evidence includes network traffic, historian streams, and operator session logs. Persistent local data includes configuration files, firmware images, and file system contents. Capturing network traffic and historian data early preserves context without touching the device.
A common operational pattern is to use lightweight preservation agents or passive sensors that record traffic and key events in real time. These components should avoid any action that changes device behavior. Heavy analysis and pattern matching happen later on copies of captured data in a safe environment.
When device interaction is required, prefer read-only APIs, documented diagnostic ports, or vendor-supported tools. If hardware-level extraction is necessary, use controlled methods (for example JTAG reads, serial console captures, or bus sniffers) with clear test plans and safety checks. Keep detailed logs of every command and action taken during live acquisition so the evidence chain is traceable.
Automation helps, but only if it is conservative. Two-stage approaches are useful, where stage one performs simple, safe preservation and stage two runs deeper analyses offline. Any automated agent must be tested to ensure it never interferes with real-time control logic.
SCADA Network Forensics
Network captures are often the richest, least disruptive source of evidence. Packet captures and flow data show commands sent to controllers, operator actions, and any external systems that are connected to the control network.
Start by placing passive capture points in places that see control traffic without being in the critical data path, such as network mirrors or dedicated taps. Capture both raw packets and derived session logs as well as timestamps with a reliable time source.
Protocol awareness is essential. We will cover some of them in the next article. A lot more will be covered during the course. Industrial protocols like Modbus, DNP3, and vendor-specific protocols carry operational commands. Parsing these messages into readable audit records makes it much easier to spot abnormal commands, unauthorized writes to registers, or suspicious sequence patterns. Deterministic models, for example, state machines that describe allowed sequences of messages, help identify anomalies. But expect normal operations to be noisy and variable. Any model must be trained or tuned to the siteβs own behavior to reduce false positives.
Network forensics also supports containment. If an anomaly is detected in real time, defenders can ramp up capture fidelity in critical segments and preserve extra context for later analysis. Because many incidents move from corporate IT into OT networks, collecting correlated data from both domains gives a bigger picture of the attackerβs path
Endpoint and Device Forensics
Field devices are the hardest but the most important forensic targets. The path to useful evidence often follows a tiered strategy, where you use non-invasive sources first, then proceed to live acquisition, and finally to hardware-level extraction only when necessary.
Non-invasive collection means pulling data from historians, backups, documented export functions, and vendor tools that allow read-only access. These sources often include configuration snapshots, logged process values, and operator commands.
Live acquisition captures runtime state without stopping the device. Where possible, use the deviceβs read-only interfaces or diagnostic links to get memory snapshots, register values, and program state. If a device provides a console or API that returns internal variables, collect those values along with timestamps and any available context.
If read-only or diagnostic interfaces are not available or do not contain the needed data, hardware extraction methods come next. This includes connecting to serial consoles, listening on fieldbuses, using JTAG or SWD to read memory, or intercepting firmware during upload processes. These operations require specialized hardware and procedures. It must be planned carefully to avoid accidental writes, timing interruptions, or safety hazards.
Interpreting raw dumps is often the bottleneck. Memory and storage can contain mixed content, such as configuration data, program code, encrypted blobs, and timestamps. But there are techniques that can help, including differential analysis (comparing multiple dumps from similar devices), data carving for detectable structures, and machine-assisted methods that separate low-entropy (likely structured) regions from high-entropy (likely encrypted) ones. Comparing captured firmware to a known baseline is a reliable way to detect tampering.
Where possible, create an offline test environment that emulates the device and process so investigators can replay traffic, exercise suspected malicious inputs, and validate hypotheses without touching production hardware.
SCADA Forensics Tooling
Right now the toolset is mixed. Investigators use standard forensic suites for control-center hosts, packet-capture and IDS tools extended with industrial protocol parsers for networks, and bespoke hardware tools or vendor utilities for field devices. Many useful tools exist, but most are specific to a vendor, a protocol, or a device family.
A practical roadmap for better tooling includes three points. First, create and adopt standardized formats for logging control-protocol events and for preserving packet captures with synchronized timestamps. Second, build non-disruptive acquisition primitives that work across device classes, ways to read key memory regions, configuration, and program images without stopping operation. Third, develop shared anonymized incident datasets that let researchers validate tools against realistic behaviors and edge cases.
In the meantime, itβs important to combine several approaches, such as maintaining high-quality network capture, work with vendors to understand diagnostic interfaces, prepare hardware tools and safe extraction procedures, while documenting everything. Establish and test standard operating procedures in advance so that when an incident happens the team acts quickly and consistently.
Conclusion
Attacks on critical infrastructure are rising, and SCADA forensics still trails IT forensics because field devices are often proprietary, have limited logging, and cannot be taken offline. We showed those gaps and gave practical actions. You will need to preserve network and historian data early, prefer read-only device collection, enforce strict IT/OT segmentation, reduce privileges, and rehearse incident response to protect those systems. In the next article, we will look at different protocols to give you a better idea of how everything works.
To support hands-on learning, our 3-day SCADA Forensics course starts in November that uses realistic ICS network topologies, breach simulations, and labs to teach how to reconstruct attack chains, identify IOCs, and analyze artifacts on PLCs, RTUs, engineering workstations and HMIs.Β
During the course you will use common forensic tools to complete exercises and focus on safe, non-disruptive procedures you can apply in production environments.Β
Enjoy a delightful yellow tomato salad bursting with summer flavour. Make it a celebration of your homegrown produce with this salad with the best citrus dressing. Make some, share some and enjoy the sun. It certainly feels so special when your garden provides you with a few good summer produce. Since it is a rainy summer this year, we have planted a few tomatoes. One of the varieties we have is the yellow pear tomato instead of the cherry tomato. These are smaller and sweeter and sunshine yellow in colour. To our surprise, this started fruiting as most as soon as the first rains started. So here are showcasing this beautiful produce with summer fresh cabbages and cucumbers.
Ingredients for the easy summer salad
Yellow tomatoes: these are a variety of cherry tomatoes. They are sweet with a burst of that tomato flavour. You really donβt have to go looking for these, cherry tomatoes or grape tomatoes will also do the job. If you have extra squishy ones, try our cherry tomato soup recipe. Cabbage:Β sweet and crunch cabbage forms the leafy base for this salad. It doesnβt matter if it is the red cabbage or the sweet white one. You can swap this for lettuce, arugula or mesclun. Cucumber: Lebanese cucumbers are the plain complement to yellow tomatoes. Since they are water laden, there are lovely to have during summer, especially in a salad. Seeds: mix the crunch part is the one that makes the salads more appetising. My go-to mix is flax, chia, sesame seeds and hemp. Depending on what you have at hand, just go with the flow. Popped quinoa tastes brilliant in this salad.
Herbs: Herbs add a good freshness to any salad. Since we are picking up some from the garden we have spring onions, gotugola ( Brahmi) and mint from the garden. So todayβs batch pick-up goes right into the salad. You can add what you have at hand to brighten up the flavours.Β
For the citrus vinaigrette.
Summer certainly is for those strong citrus flavours. This basic citrus vinaigrette has lemon zest, lemon juice, whole grain mustard, grated garlic and grated ginger along with salt. It has no oil added, you can add a teaspoon of olive oil if you like. Do you really need a dressing for this salad, maybe just lemon and salt will do, but it is far nicer with this basic lemon vinaigrette. Since we are using sweet tomatoes,Β I have not added sugar or date syrup to them. If you are using this dressing for, say, coleslaw or basic garden salad mix, add a tsp of date syrup.
Putting together a meal
Option 1: The salad is actually a fantastic idea to serve at a BBQ or lunch. Make some crusty toast, and creamy cheese to add to a platter. Donβt forget to keep some chocolate crackles for desserts Option 2: Pop some vegetable sheek kebabs on the barbecue. Toast up some flatbreads. Whip up some cacik sauce and roll up a kind of Greek gyros. Option 3: Keep light to follow up with a cold drink, like berry kombucha and then serve some chocolate dessert brownies to make it up.
The recipe card below carries step-by-step guidance to make this easy summer salad. You can directly pin this onto your board to make during the tomato season. Share with us how you feel making this recipe in the comments below with a rating of upto 5 stars
Enjoy a delightful yellow tomato salad bursting with summer flavour. Make it a celebration of your homegrown produce with this salad with the best citrus dressing. Make some, share some and enjoy the sun.
Course Salad
Cuisine gluten free, International, One pot, Vegan, Vegetarian
Keyword Lunch recipes, no cook recipes,, vegan
Prep Time 15minutes
Servings 2people
Equipment
Cutting board
Knife
mandolin slicer
mixing bowls and spoons.
Ingredients
15smallcherry tomatoesyellow or red.
1cupcabbageshredded
2mdiumcucumbersliced
2-3spring onions
10leavesindian pennywortbrahmi ( optional)
10leavesmint leaves(optional)
seed mix
1tbspflax seeds
1tspToasted sesame seeds
1tspHemp seeds
salad dressing
2tbspcitrus dressing
Instructions
Wash and slice the tomatoes.
Add it to the mixing bowl with shredded cabbage.
Slice the cucumber and add to the bowl.
Chop the herbs and add to the mixing bowl.
Add the citrus dressing and toss well.
Transfer to a serving dish and sprinkle the seed mix.
The salad is now ready to be served.
Stay connected
As a home gardener, I get very excited when I see produce come up and the garden active with bees and butterflies. These have an emotional connection to the fruits kind of a sense of joy in their own way. Try your green thumb, you didnβt always have to get it right, but donβt give up. When you make this yellow tomato salad, whatever type of tomato hope you enjoy the experience. Let us know in the comments how you feel about it and rate the recipe. Donβt forget the citrus dressing is perfect for kidney bean salad or edamame salad. Stay with us for more, enjoy reading the blog and stay subscribed.Β