#CRITIFENCE, #Cyber, #Security, #cybersecurity, #SCADA, #ICS, #OT, #IioT, #CI, #Critical, #Infrastructure, #criticalinfrastructure
SCADARadar is a Critical Infrastructure, SCADA, ICS and IoT hardware equipment radar which enables researchers, analysts and cyber security experts to get the most updated information about hardware equipment and SCADA networks which connected over the internet.
SCADARadar collects data of PLCs, HMIs, OPCs and other Critical Infrastructure, SCADA, ICS and IoT hardware equipment through ongoing crawling process of public and private databases include SCADA Dorks Database (SDD), Google Hacking Database (GHDB), Shodan, Censys and more.
SCADARadar includes a Critical Infrastructure, SCADA, ICS and IoT hardware classification engine which analyzes the results in order to detect and reduce false-positives, unreliable results and honey-pots. The final results are listed in SCADARadar interface.
The name UMASploit derived from the UMAS protocol. UMAS is a “secret” Kernel level protocol and an administrative control layer used in Unity series PLC and Unity OS from 2.6. (and in other products as well), it relies on the Modicon Modbus protocol, a common protocol in Critical Infrastructure, SCADA and industrial control systems and used to access both unallocated and allocated Memory from PLC to SCADA system.
The next version of SCADARadar will include more widgets and features.
The information in SCADARadar database updated every 30 minutes and the full information is available via CRITIFENCE API, for more information you can e-mail to firstname.lastname@example.org, or navigate to http://api.critifence.com
The latest version (SCADARadar v1.6) is available here:http://www.scada-radar.com/
For more information about CRITIFENCE® Cyber Security Solution for Critical Infrastructure,
SCADA and Industrial Control Systems and the SCADADome solution, download SCADADome Solution White Paper.