View on GitHub

Rodney Hall | Cybersecurity Portfolio

Hands-on cybersecurity portfolio covering SOC operations, incident triage, threat detection, identity management, cloud security, and OT/ICS environments.

Back to Portfolio

OT Network Threat Detection & Incident Analysis

Overview

Analyzed OT network traffic for indicators of unauthorized control activity and active reconnaissance. Identified Modbus/TCP function codes consistent with write operations issued without any authentication exchange, and flagged BACnet broadcast traffic exhibiting device enumeration patterns inconsistent with normal polling behavior. Documented IOCs across both protocols and produced findings and escalation recommendations aligned to ICS incident response procedures.

Objective

Detect and document anomalous OT protocol activity in captured network traffic and produce a written incident analysis with escalation rationale and mitigation recommendations.

Tools Used

What I Did

Evidence / Findings

Modbus — suspicious control command Modbus Suspicious Command Modbus frame showing a write-class function code issued to a target device. No authentication exchange precedes the command — the device accepted the instruction without verifying the source.

Modbus — request/response correlation Modbus Request Response Corresponding response frame confirms the write command was executed. Unauthenticated control of device state confirmed.

BACnet — active device enumeration BACnet Reconnaissance Who-Is broadcast traffic captured at volume and timing inconsistent with normal device polling — consistent with active device discovery by an unauthorized source.

BACnet — enumeration confirmed BACnet Device Discovery I-Am responses confirm target devices responded to the discovery traffic, providing the source with an addressable device inventory.

Outcome / Recommendations

The observed activity meets the escalation threshold for a monitored OT environment. Unauthenticated write commands combined with active reconnaissance behavior represents a credible risk to device availability and operational safety. While no destructive outcome was confirmed in the captured traffic, the conditions exist for an unauthorized actor to alter device state or map the OT network without detection.

Recommended actions: