Wireless and remote access: When the air gap has bridges¶
Or: Why Ponder Didn’t Test What Wasn’t There (But Should Have Been)
The problem with air gaps¶
The term “air gap” in OT security refers to the theoretical isolation of control systems from external networks through the simple expedient of not connecting them to anything. It’s a wonderfully simple security model: if there’s no physical connection, there can be no network intrusion. This works brilliantly right up until someone needs to access the system remotely, at which point the air gap acquires a bridge, and then another bridge for redundancy, and before long you have more bridges across your air gap than the River Ankh has crossing points.
The Ankh is famously more solid than liquid, to the point where you can almost walk across it if you’re brave and have had your tetanus shots. The air gaps in most OT environments have achieved a similar state of solidity. They’re still called air gaps, everyone agrees they exist, but in practice they’re permeated with wireless access points, 4G routers, Bluetooth devices, satellite links, and various other forms of electromagnetic radiation that rather undermine the whole “air” aspect of the gap.
At actual facilities (the sort Ponder visited during consulting work), the official network architecture showed pristine air gaps between control networks and everything else. The reality, discovered during wireless surveys, was that control networks had more wireless access points than corporate networks, including multiple 4G routers, satellite modems, collections of Bluetooth-enabled sensors, Zigbee networks for building automation that somehow intersected with industrial controls, and enthusiastic contractors who’d installed their own solutions.
What the simulator doesn’t test (yet)¶
The UU P&L simulator currently runs entirely on localhost (127.0.0.1). There are no wireless protocols, no remote access mechanisms, no vendor VPNs, no 4G modems hidden in junction boxes. Everything communicates over local TCP/IP on specific ports.
This is a deliberate simplification. The simulator focuses on industrial protocol vulnerabilities, not wireless security or remote access security. Those are important topics, but they’re largely covered by existing IT security resources and tools.
Current simulator scope:
Industrial protocols: Modbus, S7, OPC UA, EtherNet/IP
PLC vulnerabilities: Unauthenticated access, memory reading, logic extraction
SCADA vulnerabilities: Anonymous OPC UA access, tag enumeration
Network reconnaissance: Protocol fingerprinting, device discovery
Not currently in simulator scope:
Wireless networks: WiFi, Bluetooth, Zigbee, LoRa
Remote access: VPNs, cellular modems, satellite links
Vendor access: Remote desktop, jump hosts, privileged access management
Physical security: Rogue access points, unauthorised modems
This doesn’t mean these topics aren’t important. It means they’re outside the current simulator’s focus on industrial protocol security.
Why wireless and remote access matter in OT¶
Wireless and remote access represent significant attack vectors in real OT environments:
Rogue access points¶
Contractors install unauthorised wireless networks because they need network access during maintenance and the official process takes too long. These rogue access points:
Bypass network security controls
Provide unmonitored access to control networks
Often use weak or default passwords
Remain active long after contractors leave
Cellular modems¶
Vendors install 4G modems for remote monitoring and troubleshooting. These create direct internet connections that:
Bypass firewalls and network segmentation
Provide permanent vendor access
Often use default credentials
May be unknown to facility operators
Bluetooth sensors¶
Industrial IoT devices increasingly use Bluetooth for wireless sensor connectivity. These often:
Use no encryption
Have no authentication
Accept connections from any device within range
Transmit sensitive process data
Vendor VPNs¶
Equipment vendors require remote access for support and maintenance. These VPN connections:
Provide direct access to control systems
Are often always-on rather than scheduled
May have excessive privileges
Depend on vendor network security
Each of these represents a bridge across the supposed air gap, and each represents an attack vector that protocol-level security cannot address.
What could be added to the simulator¶
Future simulator enhancements could include:
Wireless protocol simulation¶
Rogue access point testing:
Simulated WiFi networks with weak security
Scripts to identify rogue APs by MAC address patterns
Tools to demonstrate WPA2-PSK cracking against weak passwords
Educational content on wireless security best practises
Bluetooth security testing:
Simulated Bluetooth sensors transmitting process data
Scripts to enumerate Bluetooth devices
Demonstrations of unencrypted Bluetooth data capture
Tools to show authentication bypass vulnerabilities
Why this would be valuable:
Demonstrates that protocol security alone isn’t sufficient
Shows how wireless bridges undermine network segmentation
Teaches wireless security assessment techniques
Illustrates real-world attack paths into control systems
Remote access simulation¶
Vendor VPN scenarios:
Simulated vendor VPN with always-on access
Scripts to demonstrate lateral movement from vendor network
Tools to show excessive privilege exploitation
Educational content on vendor access management
Cellular modem discovery:
Simulated cellular gateway providing internet access
Scripts to identify unauthorised remote access devices
Tools to demonstrate default credential exploitation
Guidance on detecting hidden remote access
Why this would be valuable:
Shows how vendor access bypasses security controls
Demonstrates supply chain security risks
Teaches remote access security assessment
Illustrates real-world compromise scenarios
Physical security integration¶
Unauthorised device detection:
Simulated network with hidden access points
Scripts to discover devices not in asset inventory
Tools to identify suspicious network behaviour
Educational content on physical security assessment
Why this would be valuable:
Connects physical and cyber security
Shows importance of asset inventory
Demonstrates that security must consider physical access
Teaches comprehensive security assessment methodology
The relationship to protocol security¶
Wireless and remote access vulnerabilities matter because they provide the initial access that enables protocol-level attacks.
Typical attack progression:
Initial access via wireless or remote access vulnerability
Compromise rogue WiFi network with weak password
Exploit vendor VPN with default credentials
Connect via discovered cellular modem
Network reconnaissance using industrial protocol tools
Port scanning to discover PLCs and SCADA servers
Protocol fingerprinting to identify device types
This is what the simulator currently teaches
Protocol-level exploitation
Modbus register manipulation
S7 memory reading and logic extraction
OPC UA tag enumeration
This is what the simulator currently demonstrates
The simulator currently focuses on steps 2-3 because those are unique to OT security. Step 1 is largely standard IT security, well-covered by existing resources. However, integrating step 1 would provide a more complete picture of real-world attack scenarios.
Ponder’s perspective¶
Ponder’s testing journal included a note about what wasn’t tested:
“The simulator demonstrates protocol-level vulnerabilities comprehensively. What it doesn’t demonstrate is how attackers gain the network access necessary to exploit those protocols.
“In actual facilities, wireless and remote access provide that initial foothold. Rogue access points, vendor VPNs, cellular modems, Bluetooth sensors, each one is a bridge across the supposed air gap.
“These aren’t protocol vulnerabilities. They’re architectural vulnerabilities. They can’t be patched. They require policy changes, process improvements, and vigilance against unauthorised devices.
“The simulator could be enhanced to demonstrate these attack vectors. Simulated wireless networks with weak credentials. Simulated vendor access with excessive privileges. Simulated cellular modems providing hidden internet access.
“This would complete the attack chain: wireless access leading to network access, leading to protocol access, leading to physical impact.
“Currently, the simulator assumes you already have network access. In reality, obtaining that access is often the first challenge attackers face.”
Educational value of future enhancements¶
Adding wireless and remote access scenarios to the simulator would teach:
For security professionals:
Complete attack chain from initial access to impact
How wireless vulnerabilities enable protocol attacks
Why air gaps fail in practice
How to assess wireless and remote access security
For operators and engineers:
Why unauthorised wireless devices are dangerous
How vendor access can be exploited
Why air gaps require constant vigilance
What secure remote access looks like
For management:
Why wireless policy enforcement matters
Why vendor access needs governance
Cost-benefit of proper remote access solutions
Risk of convenience-driven workarounds
Current resources for wireless testing¶
Whilst the simulator doesn’t currently cover wireless and remote access, several excellent resources exist:
Wireless security testing:
Aircrack-ng suite for WiFi security testing
Ubertooth One for Bluetooth analysis
HackRF One for SDR-based protocol analysis
Documented extensively in IT security literature
Remote access security:
VPN security assessment methodologies
Privileged access management best practises
Vendor risk management frameworks
Standard IT security audit procedures
The simulator’s value is in teaching what these resources don’t cover: industrial protocol security. Future enhancements could bridge the gap, showing how IT security vulnerabilities (wireless, remote access) lead to OT security impacts (protocol exploitation, physical consequences).
Future development priorities¶
If wireless and remote access features were added to the simulator, priorities would be:
Priority 1: Rogue access point scenario¶
Educational value: High (very common in real facilities)
Technical complexity: Moderate
Integration with existing content: Good (provides initial access for protocol attacks)
Priority 2: Vendor VPN scenario¶
Educational value: High (common attack vector)
Technical complexity: Moderate
Integration with existing content: Excellent (demonstrates supply chain risk)
Priority 3: Bluetooth sensor simulation¶
Educational value: Moderate (increasingly common)
Technical complexity: Low
Integration with existing content: Good (demonstrates IoT security issues)
Priority 4: Cellular modem discovery¶
Educational value: Moderate (less common but high impact)
Technical complexity: Low
Integration with existing content: Good (demonstrates hidden access risk)
Conclusion¶
The UU P&L simulator currently focuses on industrial protocol security, assuming the attacker already has network access to OT systems. This is a reasonable simplification that allows deep focus on protocol-level vulnerabilities.
However, real-world attacks begin with obtaining that network access, often through wireless or remote access vulnerabilities. Future simulator enhancements could include these attack vectors, providing a more complete picture of OT security assessment.
Until then, wireless and remote access security should be understood as complementary topics, covered by standard IT security resources but critically important for understanding complete attack chains in OT environments.
The air gap, in practice, is full of holes. Understanding what those holes look like and how to find them is essential for comprehensive OT security assessment.
Further reading:
Network Security - Reconnaissance and protocol fingerprinting
Workstation Security - Engineering access and entry points
Supply Chain Security - Vendor access and remote connectivity
For wireless security testing tools and techniques, consult standard IT security resources. The simulator focuses on what happens after network access is obtained, not how that access is initially achieved.