Discover today how we work in audits in industrial communications, one of our most requested services.

Advantages of audits in industrial communications

A Industrial communication It will be affected based on various aspects, considering threats and problems of various kinds. Therefore, the audits will allow us to be aware of it and, of course, to propose the best solutions that can be implemented. For example, with them:

  • We detect which are the default settings.
  • We know the vulnerabilities that devices have or could have under what circumstances.
  • We check if there are control problems for access to networks.
  • We detect network implementation and / or deployment errors.
  • We reduce the impact that possible attacks or incidents can have.
  • We implement correction actions for various situations.
  • We check which version we are working with to know its characteristics and, based on it, decide how to act.

How an audit of this type is

Knowing how necessary and positive they are for our systems, it only remains to know how they are carried out, hard work but not too difficult if carried out by professionals.

Audit networks in Barcelona

Testing phase in an industrial audit

These depend, to a large extent, on what communication protocols are being used in the installation as this naturally determines the variety of problems and vulnerabilities and, therefore, the risks that are suffered or may be suffered. Some of these tests are:

  • For WiFi:
    • Is there a request for an access key for association or traffic capture?
    • How is the encryption used on the network?
    • You have made a modification of the password which is given by default?
    • What is its robustness? Does it support dictionary attacks?
    • Denial of service. Most are based on the creation of interference in the channels that are used or the network access points are attacked.
    • Network spoofing tests. A rogue access point is created that emulates
  • For WiMAX networks:
    • Denial of service performed at the physical layer. These are directed to the specific data packets and headers (by means of short-term interferences), to the communication channel by introducing noise in frequency and to the subscriber station sending false packets that consume resources.
    • Denial of service at the MAC, which is the media access layer.
    • Verification of the robustness of authentication mechanism PHY (physical layer).
  • Para WirelessHART:
    • Validation of the security mechanisms that are implemented, ensuring that commands are not injected into the network.
    • Checking the modification and robustness of the encryption key Join Key.

Auditing and consulting network

Help Tools

To accomplish the above and many other checks a general tool can be used as Wireshark, which is responsible for the capture and analysis of network traffic at the same time that it can be used to attack using brute force.

In addition, it will be necessary to make use of other specific tools that will vary depending on the protocol used in each network and that are given alone or in suite.

So far this week's post! Do you have any doubt? Remember that, as always, you can put yourself in contacto con nosotros and we will advise you 🙂