{"id":616,"date":"2022-09-21T08:26:30","date_gmt":"2022-09-21T08:26:30","guid":{"rendered":"https:\/\/inprotech.es\/?p=616"},"modified":"2025-02-17T10:48:37","modified_gmt":"2025-02-17T10:48:37","slug":"vulnerability-scanners-in-ot-networks","status":"publish","type":"post","link":"https:\/\/inprotech.es\/en\/vulnerability-scanners-in-ot-networks\/","title":{"rendered":"Vulnerability scanners in OT networks: a quick overview"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">The field of cybersecurity has a well deserved relevance into the operational design of any company or organization nowadays. While this is unanimously the case for Information Technology (IT) environments, the case is more complex when dealing with industrial settings, in what is called Operational Technology (OT). In this short overview, we illustrate this with a quick dive into the topic of vulnerability scanners in the context of OT networks.<\/span><\/p>\n\n<h2><span style=\"font-weight: 400;\">Introduction<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">It is clear now, with one fifth of the XXI century already in our backs, that cybersecurity has become a critical aspect of the everyday life of companies, governments, organizations, and even citizens. Cyberthreats are clearly on the rise, with 2021 seeing an increase of 68 percent in data breaches with respect to 2020[1], and malicious users now having even more vectors of attack with the ever-expanding digitalization that the world is still experiencing. Compromising private data or hijacking devices, to name a few examples, are major threats that can potentially target everyone and cause great harm in the form of economic loss or personal distress, but they pale in comparison with an attack aiming to halt the normal operation of a water treatment plant, or a power station. When we move up to the industrial plane, even a single successful attack could in fact destabilize societies.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This worrisome realization goes in hand with the arrival of the Fourth Industrial Revolution, that is turning factories into networks of agents interconnected via the Internet Protocol (IP), also accessible from the outside for monitoring and control. This breaks the main protection of traditional industrial control systems (ICS) in two ways: isolation and the usage of proprietary control protocols[2]. In this regard, industrial plants are now vulnerable to the plethora of attacks known in IT environments, and oftentimes the typical solutions are not so easily implemented due to the more complex nature of OT networks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">And the trend is, in fact, that cybercriminals are widening their focus to include OT targets. Since 2010, when the infamous and highly sophisticated <\/span><i><span style=\"font-weight: 400;\">Stuxnet <\/span><\/i><span style=\"font-weight: 400;\">worm infected an Iranian nuclear facility in Natanz, damaging the centrifuges and delaying the national nuclear program, the number of cyberattacks on OT systems are far from an extraordinary occurrence. In fact, according to the <\/span><i><span style=\"font-weight: 400;\">2021 State of Operational Technology and Cybersecurity Report <\/span><\/i><span style=\"font-weight: 400;\">by Fortinet, more than 6 out of 10 organizations experienced three or more intrusions in their systems in 2021, and only 7% reported none[3].<\/span><\/p>\n<figure id=\"attachment_960\" aria-describedby=\"caption-attachment-960\" style=\"width: 582px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-960 \" src=\"https:\/\/inprotech.es\/wp-content\/uploads\/2022\/03\/Imagen1.png\" alt=\"\" width=\"582\" height=\"254\" srcset=\"https:\/\/inprotech.es\/wp-content\/uploads\/2022\/03\/Imagen1.png 504w, https:\/\/inprotech.es\/wp-content\/uploads\/2022\/03\/Imagen1-300x131.png 300w\" sizes=\"auto, (max-width: 582px) 100vw, 582px\" \/><figcaption id=\"caption-attachment-960\" class=\"wp-caption-text\">Image 1. <span style=\"font-weight: 400;\">Number of intrusions in the last three years as reported by OT managers. Data extracted from Ref. 3.<\/span><\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<h2>Vulnerability scanners<\/h2>\n<p><span style=\"font-weight: 400;\">As we mentioned before, the methods applied to protect an OT environment are different from the ones designed for IT, which is somehow conflicting with the current path of OT\/IT integration driven by the Industrial Internet of Things (IIoT). Despite the endless possibilities that this technology enables (in terms of efficiency, security, and self-management), it is also undeniable that under this framework every OT element is a potential liability.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Last 2019, the Cyber Independent Testing Lab (CITL)[4], a non-profit organization with <\/span><i><span style=\"font-weight: 400;\">\u201dthe mission of advising software consumers through expert scientific inquiry into software safety\u201d<\/span><\/i><span style=\"font-weight: 400;\">, presented a survey finding that more than 6,000 firmware versions from 18 vendors showed little to no improvement in security in the span of more than a decade (2003-2018)[5]. Moreover, there are several other ways in which OT\/IT integration might be problematic[6]: (i) lack of communication between IT and OT manufacturers and developers, (ii) large lifespan of OT systems, without proper security updates, (iii) most OT systems are required to function on a 24\/7 cycle, making it extremely cumbersome and\/or expensive to stop them in order to perform security updates.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The strategy is, then, to use those security tools developed for IT systems but tailoring them so that they become useful (or, at least, not harmful) when given the task of looking at a modern ICS network. One of the main cybersecurity tools used in IT are vulnerability scanners, a set of computer programs designed to test systems against known weaknesses, such as those collected in the CVE list (<\/span><i><span style=\"font-weight: 400;\">Common Vulnerabilities and Exposures<\/span><\/i><span style=\"font-weight: 400;\">) by MITRE[7]. Roughly speaking, one can split these scanning techniques in two categories: passive or active, depending on the level of engagement between the scanner and the scanned device.<\/span><\/p>\n<h3>Active Scanners<\/h3>\n<p><span style=\"font-weight: 400;\">Active scanners are a staple in the IT-security toolkit, and some are routinely used in all kind of systems as SaaS (Software as a Service). Nmap, and its faster alternative Zmap, are two ubiquitous and open-source network scanner tools. Some other bulkier options with more options and functionalities are Nessus, OpenVAS (an open-source fork of Nessus), or Metasploit. In their core, they relay on sending packets and monitoring the response. The problem when applying them on OT elements, such as Programmable Logic Controllers (PLCs), Supervisory Control and Data Acquisiton (SCADA) systems, or Process Control Systems (PCSs), is that they can interact unexpectedly with the scanning packets, causing all sorts of malfunctioning behaviour, compromising the operation of the network and even the integrity of such devices. Some techniques consist on sending on purpose corrupted data to the devices, and while an IT network can easily recover from such an interference, that is not the case in an average OT facility. Moreover, many industrial protocols are very sensitive to latency and require precise synchronization, so just a simple network scan can be enough to disrupt the system. Some real-life examples drawn from Ref.8:<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\"> A SCADA network operating on an array of robotic arms was subjected to a ping sweep while the controllers were on standby mode, causing one of them to perform a quick 180 degree turn. Fortunately, no one was on the 2.5 m reach of the arm.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> A similar ping sweep was trying to identify all hosts on a PCS network, halting a system responsible for the creation of integrated circuits, with an estimated loss of <\/span><span style=\"font-weight: 400;\">\u00a3<\/span><span style=\"font-weight: 400;\">50k.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> In a gas facility, an IT penetration test spilled into the SCADA system, resulting in the blockage of all gas pipelines for several hours.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Unfortunately, there is still a notable level of scarcity in the knowledge of how these industrial protocols actually work and interact with the scanners, making it impossible to draw predictions[9].<\/span><\/p>\n<p><span style=\"font-weight: 400;\">All these points illustrate why active scanners are considered inappropriate options for OT vulnerability management in general, and why many industrial companies decide to skip them altogether and use passive listening tools instead.<\/span><\/p>\n<h3>Passive Scanners<\/h3>\n<p><span style=\"font-weight: 400;\">Passive scanners consist of a set of techniques of listening (<\/span><i><span style=\"font-weight: 400;\">sniffing<\/span><\/i><span style=\"font-weight: 400;\">) to the network, by mirroring a port in a switch or a Terminal Access Point (TAP), and extract or infer information just by looking at the packets being transferred, like version fingerprints or hints that reveal the operating system running on a device.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Being a much safer option for the stability of the network, it also comes with the price of a much more limited scope. Silent devices cannot be analyzed -as the adage says, <\/span><i><span style=\"font-weight: 400;\">you cannot secure what you cannot see<\/span><\/i><span style=\"font-weight: 400;\">[10]. It will require more time to gather enough information to make a picture of the situation, and more data will be generated that will need a larger filtering effort. It is also very hard to create a template applicable to any system; rather, one has to depend on the OT-administrator\u2019s expertise on actual the network, the devices running on it, its protocols, etc[11].<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A common way to perform a passive scanner is with the combined usage of NetworkMiner, a packet analyzer, and p0f and FingerBank, two databases where one can map OS with several parameters of a TCP\/IP connection and several implementations of DHCP, respectively. For some of the standard open industrial protocols, like Modbus or EthernetIP, one could directly read the exchanged frames after capturing them with tools such as tcpdump or Wireshark.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the midst of the discussion of active and passive scanners in OT networks, some voices expressed their concerns about the actual passivity of the latter, claiming that the term was being using euphemistically and that it had evolved into something more akin to <\/span><i><span style=\"font-weight: 400;\">asset visibility<\/span><\/i><span style=\"font-weight: 400;\">. A quick list of some of the reasons:<\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\"> Not every switch is capable of mirroring the OT traffic. Even in those scenarios where it is indeed possible, it is not uncommon that the switch presents other severe technical limitations.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Activating some protocols required for the passive scanner might enable vulnerabilities on the OT network.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> Some of the information given to the scanner has to be generated somehow because OT agents normally perform just the task that they were designed to perform, and not something unnecessary for the operation of the network like giving away their vendor, or serial number. The system has to create \u201dfake traffic\u201d in order to get some of this information.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"> The scanner has to be able to read the traffic, but this might be challenging when almost everything is encrypted. Lifting the encryption would solve the issue, but for a heavy prize.<\/span><\/li>\n<\/ul>\n<p>In summary, in order for a passive scanner to be some-what useful some compromise has to be made, and strictly speaking the passiveness might be left behind in the process[12].<\/p>\n<h2><span style=\"font-weight: 400;\">Summary<\/span><\/h2>\n<p>In this short overview, we have offered a first dive into the topic of vulnerability scanners in the context of OT networks, stating the need for them in the first place, and going through the dangers and weakness of active and passive techniques, respectively.<\/p>\n<p>As the field of cybersecurity in the industrial world evolves and matures, some narratives trying to break from the limited perspective of \u201dactive versus passive\u201d are starting to see the light[13]. The path for such a transcendence move would be to cook, thanks to the accumulated experience, the right mix of techniques together with the application of fail-safe designs. After a couple decades, that some might label as lost in ICS security, it seems like the field is ready to take up the challenge of planning a balanced way to optimize the usage of every scanning techniques available.<\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">[1]https:\/\/www.idtheftcenter.org\/post\/identitytheft-resource-center-2021-annual-databreach-report-sets-new-record-for-number-ofcompromises.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">[2] Guide to Industrial Control Systems (ICS) Security,<\/span><\/p>\n<p><span style=\"font-weight: 400;\">http:\/\/dx.doi.org\/10.6028\/NIST.SP.800-82r2 (2015).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">[3] https:\/\/www.fortinet.com\/content\/dam\/fortinet\/assets\/analyst-reports\/report-2021-otcybersecurity.pdf.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">[4] https:\/\/sarah-zatko.squarespace.com\/.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">[5] https:\/\/securityledger.com\/2019\/08\/huge-surveyof-firmware-finds-no-security-gains-in-15-years\/.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">[6] https:\/\/searchitoperations.techtarget.com\/definition\/IT-OT-convergence.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">[7] https:\/\/mitre.org\/.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">[8] D. P. D. et al., Penetration Testing of Industrial Control Systems, Sandia National Laboratories (2005).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">[9] E. Samanis, J. Gardiner, and A. Rashid, A taxonomy for contrasting industrial control systems asset discovery<\/span><\/p>\n<p><span style=\"font-weight: 400;\">tools (2022), arXiv:2202.01604 [cs.CR].<\/span><\/p>\n<p><span style=\"font-weight: 400;\">[10] https:\/\/www.caba.org\/wp-content\/uploads\/2020\/11\/IS-2020-150.pdf.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">[11] K. C. et al., Vulnerability analysis of network scanning on scada systems, Security and Communication Networks (2018).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">[12] http:\/\/www.industrialdefender.com\/why-passivenetwork-monitoring-isnt-passive\/.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">[13]https:\/\/www.securityweek.com\/active-vs-passivemonitoring-no-longer-either-or-proposition.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: left;\"><a style=\"background: #369fa2; color: #fff; padding: 8px 15px !important; border-radius: 3px; font-size: 20px;\" href=\"https:\/\/inprotech.es\/wp-content\/uploads\/2022\/03\/AT-T1-2022-Vulnerability_scanners_in_OT_networks_a_quick_overview.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Download here the Tech Paper<\/strong><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The field of cybersecurity has a well deserved relevance into the operational design of any company or organization nowadays. While this is unanimously the case for Information Technology (IT) environments, the case is more complex when dealing with industrial settings, in what is called Operational Technology (OT). In this short overview, we illustrate this with&#8230;<\/p>\n","protected":false},"author":1,"featured_media":621,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[49,17],"tags":[],"class_list":["post-616","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guardian-en","category-techpapers-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Vulnerability scanners in OT networks: a quick overview - InprOTech<\/title>\n<meta name=\"description\" content=\"Cybersecurity has a well-deserved relevance in the operational design of any company. While this is unanimous in IT environments, the case is more complex when it comes to industrial environments. In this brief overview, we will illustrate this with a quick dive into the topic of vulnerability scanners in the context of OT networks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/inprotech.es\/en\/vulnerability-scanners-in-ot-networks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vulnerability scanners in OT networks: a quick overview - InprOTech\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity has a well-deserved relevance in the operational design of any company. While this is unanimous in IT environments, the case is more complex when it comes to industrial environments. In this brief overview, we will illustrate this with a quick dive into the topic of vulnerability scanners in the context of OT networks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/inprotech.es\/en\/vulnerability-scanners-in-ot-networks\/\" \/>\n<meta property=\"og:site_name\" content=\"InprOTech\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-21T08:26:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-17T10:48:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/inprotech.es\/wp-content\/uploads\/2022\/03\/Vulnerability-scanners.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/vulnerability-scanners-in-ot-networks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/vulnerability-scanners-in-ot-networks\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/inprotech.es\\\/#\\\/schema\\\/person\\\/cb0ae1292b18b48c1e89b0e4e7ef15d9\"},\"headline\":\"Vulnerability scanners in OT networks: a quick overview\",\"datePublished\":\"2022-09-21T08:26:30+00:00\",\"dateModified\":\"2025-02-17T10:48:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/vulnerability-scanners-in-ot-networks\\\/\"},\"wordCount\":1798,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/vulnerability-scanners-in-ot-networks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/inprotech.es\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Vulnerability-scanners.jpg\",\"articleSection\":[\"Guardian\",\"Techpapers\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/inprotech.es\\\/en\\\/vulnerability-scanners-in-ot-networks\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/vulnerability-scanners-in-ot-networks\\\/\",\"url\":\"https:\\\/\\\/inprotech.es\\\/en\\\/vulnerability-scanners-in-ot-networks\\\/\",\"name\":\"Vulnerability scanners in OT networks: a quick overview - InprOTech\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/vulnerability-scanners-in-ot-networks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/vulnerability-scanners-in-ot-networks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/inprotech.es\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Vulnerability-scanners.jpg\",\"datePublished\":\"2022-09-21T08:26:30+00:00\",\"dateModified\":\"2025-02-17T10:48:37+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/#\\\/schema\\\/person\\\/cb0ae1292b18b48c1e89b0e4e7ef15d9\"},\"description\":\"Cybersecurity has a well-deserved relevance in the operational design of any company. While this is unanimous in IT environments, the case is more complex when it comes to industrial environments. In this brief overview, we will illustrate this with a quick dive into the topic of vulnerability scanners in the context of OT networks.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/vulnerability-scanners-in-ot-networks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/inprotech.es\\\/en\\\/vulnerability-scanners-in-ot-networks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/vulnerability-scanners-in-ot-networks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/inprotech.es\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Vulnerability-scanners.jpg\",\"contentUrl\":\"https:\\\/\\\/inprotech.es\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/Vulnerability-scanners.jpg\",\"width\":1536,\"height\":768},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/inprotech.es\\\/en\\\/vulnerability-scanners-in-ot-networks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/inprotech.es\\\/en\\\/pagina-de-inicio\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vulnerability scanners in OT networks: a quick overview\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/inprotech.es\\\/#website\",\"url\":\"https:\\\/\\\/inprotech.es\\\/\",\"name\":\"InprOTech\",\"description\":\"The Cybersecurity Solution for the Industrial Environment\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/inprotech.es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/inprotech.es\\\/#\\\/schema\\\/person\\\/cb0ae1292b18b48c1e89b0e4e7ef15d9\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/inprotech.es\"],\"url\":\"https:\\\/\\\/inprotech.es\\\/en\\\/author\\\/moon\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vulnerability scanners in OT networks: a quick overview - InprOTech","description":"Cybersecurity has a well-deserved relevance in the operational design of any company. While this is unanimous in IT environments, the case is more complex when it comes to industrial environments. In this brief overview, we will illustrate this with a quick dive into the topic of vulnerability scanners in the context of OT networks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/inprotech.es\/en\/vulnerability-scanners-in-ot-networks\/","og_locale":"en_US","og_type":"article","og_title":"Vulnerability scanners in OT networks: a quick overview - InprOTech","og_description":"Cybersecurity has a well-deserved relevance in the operational design of any company. While this is unanimous in IT environments, the case is more complex when it comes to industrial environments. In this brief overview, we will illustrate this with a quick dive into the topic of vulnerability scanners in the context of OT networks.","og_url":"https:\/\/inprotech.es\/en\/vulnerability-scanners-in-ot-networks\/","og_site_name":"InprOTech","article_published_time":"2022-09-21T08:26:30+00:00","article_modified_time":"2025-02-17T10:48:37+00:00","og_image":[{"width":1536,"height":768,"url":"https:\/\/inprotech.es\/wp-content\/uploads\/2022\/03\/Vulnerability-scanners.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/inprotech.es\/en\/vulnerability-scanners-in-ot-networks\/#article","isPartOf":{"@id":"https:\/\/inprotech.es\/en\/vulnerability-scanners-in-ot-networks\/"},"author":{"name":"admin","@id":"https:\/\/inprotech.es\/#\/schema\/person\/cb0ae1292b18b48c1e89b0e4e7ef15d9"},"headline":"Vulnerability scanners in OT networks: a quick overview","datePublished":"2022-09-21T08:26:30+00:00","dateModified":"2025-02-17T10:48:37+00:00","mainEntityOfPage":{"@id":"https:\/\/inprotech.es\/en\/vulnerability-scanners-in-ot-networks\/"},"wordCount":1798,"commentCount":0,"image":{"@id":"https:\/\/inprotech.es\/en\/vulnerability-scanners-in-ot-networks\/#primaryimage"},"thumbnailUrl":"https:\/\/inprotech.es\/wp-content\/uploads\/2022\/03\/Vulnerability-scanners.jpg","articleSection":["Guardian","Techpapers"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/inprotech.es\/en\/vulnerability-scanners-in-ot-networks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/inprotech.es\/en\/vulnerability-scanners-in-ot-networks\/","url":"https:\/\/inprotech.es\/en\/vulnerability-scanners-in-ot-networks\/","name":"Vulnerability scanners in OT networks: a quick overview - InprOTech","isPartOf":{"@id":"https:\/\/inprotech.es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/inprotech.es\/en\/vulnerability-scanners-in-ot-networks\/#primaryimage"},"image":{"@id":"https:\/\/inprotech.es\/en\/vulnerability-scanners-in-ot-networks\/#primaryimage"},"thumbnailUrl":"https:\/\/inprotech.es\/wp-content\/uploads\/2022\/03\/Vulnerability-scanners.jpg","datePublished":"2022-09-21T08:26:30+00:00","dateModified":"2025-02-17T10:48:37+00:00","author":{"@id":"https:\/\/inprotech.es\/#\/schema\/person\/cb0ae1292b18b48c1e89b0e4e7ef15d9"},"description":"Cybersecurity has a well-deserved relevance in the operational design of any company. While this is unanimous in IT environments, the case is more complex when it comes to industrial environments. In this brief overview, we will illustrate this with a quick dive into the topic of vulnerability scanners in the context of OT networks.","breadcrumb":{"@id":"https:\/\/inprotech.es\/en\/vulnerability-scanners-in-ot-networks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/inprotech.es\/en\/vulnerability-scanners-in-ot-networks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/inprotech.es\/en\/vulnerability-scanners-in-ot-networks\/#primaryimage","url":"https:\/\/inprotech.es\/wp-content\/uploads\/2022\/03\/Vulnerability-scanners.jpg","contentUrl":"https:\/\/inprotech.es\/wp-content\/uploads\/2022\/03\/Vulnerability-scanners.jpg","width":1536,"height":768},{"@type":"BreadcrumbList","@id":"https:\/\/inprotech.es\/en\/vulnerability-scanners-in-ot-networks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/inprotech.es\/en\/pagina-de-inicio\/"},{"@type":"ListItem","position":2,"name":"Vulnerability scanners in OT networks: a quick overview"}]},{"@type":"WebSite","@id":"https:\/\/inprotech.es\/#website","url":"https:\/\/inprotech.es\/","name":"InprOTech","description":"The Cybersecurity Solution for the Industrial Environment","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/inprotech.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/inprotech.es\/#\/schema\/person\/cb0ae1292b18b48c1e89b0e4e7ef15d9","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d903daf71b546605502fd9841b9dc598cc8d3a04ee26680ca18eb3633e5209be?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/inprotech.es"],"url":"https:\/\/inprotech.es\/en\/author\/moon\/"}]}},"_links":{"self":[{"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/posts\/616","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/comments?post=616"}],"version-history":[{"count":8,"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/posts\/616\/revisions"}],"predecessor-version":[{"id":968,"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/posts\/616\/revisions\/968"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/media\/621"}],"wp:attachment":[{"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/media?parent=616"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/categories?post=616"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/inprotech.es\/en\/wp-json\/wp\/v2\/tags?post=616"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}