Overview

Learn OT/ICS pentesting by exploring, breaking things, and having fun

What is this?

A full-day adventure where you learn industrial security by actually doing it. No lectures. No rigid schedule. Just you, a simulator full of vulnerable control systems, and interesting challenges to tackle.

You can crash turbines. Steal secrets. Break things. All safely in a simulator where mistakes don’t matter and curiosity is encouraged.

Duration: A full day (arrive around 9am, finish around 5pm, with breaks for coffee and lunch when you want them)

For: University students learning security, especially those who know IT security and want to understand OT/ICS

Style: Montessori for adults - explore at your own pace, pick challenges that interest you, learn by doing

How it works

You arrive. You get:

  • Access to the UU Power & Light simulator (a power plant with PLCs, SCADA servers, and lots of vulnerabilities)

  • A collection of pentesting scripts

  • A list of interesting challenges

  • Facilitators who’ll help when you’re stuck

  • Freedom to explore however you want

You choose:

  • Which challenges interest you

  • Whether to work alone or in a small group

  • How deep to go on any topic

  • When to take breaks

  • Whether to focus on technical hacking or communication/reporting

You discover:

  • How industrial protocols work (or don’t)

  • Why OT security is different from IT security

  • What you can do with unauthenticated access to control systems

  • How to explain technical findings to non-technical people

  • That breaking things in a simulator is really quite fun

What you can learn

Technical skills:

  • Industrial protocol pentesting (Modbus, S7, OPC UA, EtherNet/IP)

  • Network reconnaissance in OT environments

  • Vulnerability discovery and exploitation

  • Creating proof of concepts that demonstrate real impact

Contextual understanding:

  • Why OT security differs from IT security

  • How industrial control systems work

  • What constraints operations teams face

  • Why “just patch it” isn’t always possible

Communication skills:

  • Translating technical findings to business language

  • Handling sceptical stakeholders

  • Understanding different perspectives (security vs operations vs management)

Most importantly: you can understand that OT security is about people, processes, and context as much as it’s about technical vulnerabilities.

The setting

You’re in Ankh-Morpork at Unseen University Power & Light, which supplies electricity to the University, the Patrician’s Palace, and significant portions of the city.

The systems are vulnerable. The stakes are high (in the story). The learning is real.

And yes, if you’re convincing enough, you might have to present your findings to Lord Vetinari. He will ask difficult questions.

What you need

  • Laptop with Python 3.12+

  • Curiosity and willingness to explore

  • Collaborative attitude (if working in groups)

  • No prior OT security experience required (that’s what you’re here to learn!)

A typical day (but not rigid!)

Morning: Most people explore and hack, trying different challenges, discovering how industrial protocols work

Lunch: Natural break, informal discussions about what people found

Afternoon: Some continue hacking, others want to present findings and practice explaining them, roleplay emerges naturally

End of day: Everyone shares what they discovered, what surprised them, what they learnt

AND: This is self-paced. If you want to spend the whole day on one deep technical challenge, do that. If you want to try lots of different things, do that. There’s no “correct” way to learn.

Ready to explore?

This isn’t a traditional workshop where you sit and listen. This is an adventure where you explore, break things (safely), and discover how industrial security works by actually doing it.

The simulator is ready. The challenges are waiting. The coffee is hot.

See you in the Unseen University at Ankh-Morpork.


Details: See the Exploration challenges for challenge descriptions and Student guide how to make the most of your day.

“Learning by doing is all very well, but learning by doing something that goes ‘bang’ is considerably more educational.” - Ponder Stibbons (probably)