Class 10 - Reversing OT traffic
This session focuses on reverse engineering OT traffic. Students learn to decode captured packet formats, recognize timing intervals, and map client-server interactions. The instructor demonstrates how UART-level sniffing reveals the logic of industrial processes, preparing students for active injection and manipulation. This class ties into the module as the transition from reconnaissance to exploitation.
Learning Objective
Reverse engineer OT communication flows and packet structures.
Training Outcomes
Break down captured packets into fields.
Recognize timing patterns in transactions.
Map functional behavior from traffic.
Hands-On Experience
Document request/reply sequences.
Reverse engineer protocol fields.
Build functional maps of OT communication.