Facilitator guide¶
How to run the around 3-hour OT pentesting masterclass
Pre-workshop preparation¶
Technical setup (1 week before)¶
Verify simulator installation:
git clone https://github.com/ninabarzh/power-and-light-sim.git
cd power-and-light-sim
pip install -r requirements.txt
python -m src.main
Test all scripts participants will use:
Reconnaissance scripts (raw-tcp-probing, modbus_identity_probe, turbine_recon)
Vulnerability assessment scripts (modbus_coil_register_snapshot, s7_plc_status_dump, opcua_readonly_probe)
Exploitation scripts (turbine_overspeed_attack, turbine_emergency_stop, historian_exfiltration)
Prepare backup materials:
Pre-recorded attack videos in case scripts fail
Screenshots of expected outputs
Sample reports and presentations
Environment options:
Option 1: Each team runs simulator locally (best for learning)
Option 2: Shared simulator instance (better for limited resources)
Option 3: Cloud-hosted instances (best for remote delivery)
Participant communication (1 week before)¶
Send installation instructions:
Please install the UU P&L simulator before the workshop:
git clone https://github.com/ninabarzh/power-and-light-sim.git
cd power-and-light-sim
pip install -r requirements.txt
python -m src.main
If you encounter installation issues, arrive 15 minutes early for technical support.
Send pre-reading (optional):
Overview of OT security challenges
Industrial protocol basics
UU P&L facility description
Physical/virtual setup (day of workshop)¶
In-person requirements:
Room for 4-6 teams to work independently
Projector for presentations
Whiteboard or flip charts
Team workspaces with power/network
Timer visible to all participants
Separate space for stakeholder briefing presentations
Remote requirements:
Video conferencing platform with breakout rooms
Shared document for findings (Google Docs, Notion, etc.)
Screen sharing capability
Virtual whiteboard (Miro, Mural, etc.)
Slack or chat for coordination
Materials checklist¶
Team assignment cards
Stakeholder persona cards
Timing schedule printed/displayed
Scoring rubric
Sample report templates
Stakeholder question bank
Patrician question cards (special set)
Prizes for winning team (optional but fun)
Workshop facilitation guide¶
Opening (~10 minutes)¶
Welcome and context, something like:
Welcome to the UU Power & Light red team assessment roleplay. Today you can experience the full cycle of OT pentesting: technical assessment, proof of concept development, and the hard part: convincing sceptical stakeholders to act on your findings.
You are red teams hired to assess UU P&L from a nation-state threat actor perspective. Your client: Unseen University. Your ultimate stakeholder: Lord Vetinari, Patrician of Ankh-Morpork.
The technical work is Phase 1. The stakeholder presentation is Phase 2. Many participants expect Phase 1 to be harder. They’re wrong.
Team formation:
3-4 people per team (no more than 6 teams total)
Mix experience levels within teams
Assign roles: Lead Pentester, Protocol Specialists, Reporter
Set expectations: Phase 1 is 90 minutes of hands-on pentesting. Find vulnerabilities, create proof of concepts, prepare your presentation. Phase 2 is stakeholder briefings where you face realistic pushback. We will make this uncomfortable on purpose. That’s the learning.
Answer questions, then: Your assessment starts now. You have network access to UU P&L systems. 90 minutes on the clock. Begin.
Phase 1: Red team assessment (~90 minutes)¶
Facilitator role¶
Circulate between teams:
Observe what approaches teams take
Listen for misconceptions
Note interesting discoveries
Identify teams that need help
Provide hints sparingly. Teams should struggle initially. That is realistic. Only intervene if:
Team is completely stuck after 15 minutes
Team is headed down wrong path that wastes time
Technical issues prevent progress
Timing interventions (maybe, depending on how things are going)¶
At 60 minutes: “30 minutes until stakeholder presentations. Make sure you’re documenting findings for non-technical audiences.”
At 75 minutes: “15 minutes left. Focus on your top 2-3 findings. Quality over quantity. Test your explanations - would the Archchancellor understand?”
At 85 minutes: “5 minutes. Finalise your presentation approach. Who’s presenting what?”
At 90 minutes: “Nearly time. Finish your current task. We begin stakeholder briefings in 5 minutes. Or tell me how much more time you need.”
Phase 2: Stakeholder presentations (60 minutes)¶
Setting the scene¶
Identify who’s playing each role:
Archchancellor Ridcully
The Bursar
Director of Operations
Chief Engineer
Safety Officer
Lord Vetinari (played by you or designated experienced facilitator)
Arrange the room:
Presenting team at front
Stakeholder panel facing them (facilitators + volunteers from other teams)
Audience (other teams) observing
Introduce the stakeholders: “You are presenting to UU P&L leadership and the Patrician. Each stakeholder has concerns. Your job: address those concerns convincingly.”
Archchancellor Ridcully (University leadership)¶
Character: Well-meaning but non-technical. Wants problems to go away. Trusts engineers more than consultants.
Opening position: “Ah yes, security. Very important. But we’ve run this facility for 20 years without incident…”
Typical questions:
“Have we actually been attacked, or is this theoretical?”
“How do you know nation-states are interested in a university power plant?”
“Can’t we just tell people not to connect unauthorised devices?”
“What do our engineers think about this?” (turns to Chief Engineer)
“The last consultants said our biggest risk was phishing. Now you say it’s industrial controls. Which is it?”
Pushback style: Dismissive through incomprehension. “I’m sure you’re very competent, but I don’t quite see the urgency…”
When to be convinced: If you connect to University reputation or show the Patrician cares.
The Bursar (Finance)¶
Character: Controls the budget. Every expense is scrutinised. Security is an overhead, not an investment.
Opening position: “Before we discuss anything, I need to understand the costs.”
Typical questions:
“€500,000 for network segmentation? That’s half our annual IT budget.”
“Can we implement only some of your recommendations? Which are truly essential?”
“If we defer the expensive items for two years, what’s the actual additional risk?”
“Your ‘quick wins’ cost €8,000. I could hire a graduate student for six months for that.”
“What’s the return on investment for security spending?”
“Do we have insurance for this? What’s the deductible?”
Pushback style: Death by budget scrutiny. Every number questioned.
When to be convinced: If you show costs of doing nothing exceed costs of fixing, or if regulatory fines are mentioned.
Director of Operations (Keeps things running)¶
Character: Practical, sceptical of changes. Every security recommendation sounds like downtime.
Opening position: “We supply power to the Palace, the Watch, and half the city. I can’t just shut things down for your tests.”
Typical questions:
“How much downtime does network segmentation require?”
“What happens if your firewall rules block legitimate traffic?”
“We have maintenance windows twice a year. Can this wait until then?”
“Those systems have worked perfectly for 20 years. Why are they suddenly insecure?”
“If we implement your recommendations and something breaks, who’s responsible?”
“Our vendor provides remote support 24/7. If we remove that access, how do we get emergency help?”
Pushback style: Operational objections. Every recommendation creates problems.
When to be convinced: If you acknowledge constraints and propose solutions that minimise disruption, or if you frame security as reliability.
Chief Engineer (Built the system)¶
Character: Technically competent and defensive. You’re criticising their life’s work.
Opening position: “I’m curious about your qualifications. Have you worked with power generation systems before?”
Typical questions:
“You say these systems lack authentication. Do you understand why? These protocols predate modern networking.”
“You call it a vulnerability. We call it operational requirement. How do you propose operators access systems during emergencies?”
“Those systems are air-gapped from the corporate network.” (They’re not, but they believe it)
“Show me specifically how you accessed the reactor PLC. I want technical details.”
“Our vendor says implementing your recommendations will void our warranty. Now what?”
“You demonstrated attacks on a simulator. Have you tested on actual equipment?”
Pushback style: Technical challenge. Questioning your expertise and understanding.
When to be convinced: If you demonstrate technical competence and respect their constraints, or if you frame recommendations as helping them rather than criticising them.
Safety Officer (Prevents accidents)¶
Character: Focused on physical safety. Cybersecurity is new territory.
Opening position: “I need to understand how cyberattacks affect physical safety.”
Typical questions:
“Can attackers actually cause equipment damage or just nuisance disruptions?”
“What about our mechanical safeguards? Don’t those prevent serious incidents?”
“Could your proposed firewall rules interfere with safety system communications?”
“How quickly could attack progress from network access to safety impact?”
“Are there regulatory requirements for cybersecurity in industrial control systems?”
“What’s the worst-case scenario if we do nothing?”
Pushback style: Practical concern mixed with uncertainty. Not hostile, but cautious.
When to be convinced: If you clearly connect cybersecurity to safety outcomes, or show regulatory requirements.
Lord Vetinari (The Patrician)¶
See Playing Lord Vetinari for detailed guidance on this critical role.
Managing the presentations¶
Timing:
15 minutes per team total
Team presents: 5-7 minutes
Stakeholder questions: 8-10 minutes
Strict time limits (use visible timer)
Facilitation approach:
As Archchancellor: Start with soft questions, show confusion at technical terms. Look to Bursar and Operations Director when numbers are mentioned. Defer to Chief Engineer on technical points. Look to Vetinari before making any commitments.
As Bursar: Interrupt with cost questions. Pull out a calculator. Write down every number mentioned. Ask for itemised breakdowns.
As Operations Director: Cross arms. Sigh when downtime is mentioned. Ask “Have you ever actually run a power plant?” at least once.
As Chief Engineer: Ask for technical details. Correct minor technical errors (if they exist). Defend design decisions. But be fair - acknowledge good technical work.
As Safety Officer: Take notes. Ask clarifying questions. Show genuine interest in understanding cyber-safety connections.
As Vetinari: Sit back. Observe. Ask one devastating question at exactly the right moment. See Playing Lord Vetinari for details.
Managing difficult moments:
If team gets defensive: “We’re not attacking you personally. These are questions you are likely to face from real clients. Practice responding constructively.”
If team is struggling badly: Soften the questioning. “Let me rephrase that. What I’m trying to understand is…”
If team is doing excellently: Increase difficulty. More sceptical questions. Bring Vetinari in earlier.
If discussion is too long: “That’s an interesting point. Let’s table detailed technical discussion and hear your overall recommendation.”
Scoring and declaring winners (10 minutes)¶
After all teams present, briefly score on three dimensions:
Technical competence (30%):
Quality of reconnaissance and vulnerability discovery
Creativity and impact of proof of concepts
Accuracy of technical understanding
Communication effectiveness (40%):
Clarity for non-technical audiences
Visual demonstration quality
Translation of technical findings to business impact
Handling of difficult questions
Practical recommendations (30%):
Realism of costs and timelines
Quality of prioritisation
Acknowledgement of constraints
Specificity and actionability
Announce winner: Keep it light. “After deliberation, the Patrician has chosen [Team Name] as the red team he’d hire. They demonstrated strong technical work, convinced multiple stakeholders, and most importantly, convinced Lord Vetinari that action is warranted.”
Highlight what each team did well.
Phase 3: Debrief and lessons (30 minutes)¶
Bring everyone back together. Time to reflect.
What went well discussion (10 minutes)¶
“What approaches worked? What convinced stakeholders?”
Common successful patterns:
Leading with business impact, not technical details
Showing video demonstrations
Acknowledging operational constraints
Providing tiered recommendations with costs
Framing security as enabling operations
Using Patrician/University reputation as leverage
What was challenging (10 minutes)¶
“What surprised you? What was harder than expected?”
Common challenges:
Stakeholder scepticism seemed unfair
Technical details didn’t translate to business language
Cost justification was difficult
Operations and engineering pushback felt personal
Not enough time to document everything
*These challenges are realistic. Real stakeholders are sceptical. Real organisations have constraints. This discomfort is the learning.
Connecting to real-world practice (10 minutes)¶
How does this apply to actual OT security assessments?
Key lessons to emphasise:
Technical skills are necessary but insufficient: Every team found vulnerabilities. Not every team convinced stakeholders. The differentiator is communication.
Stakeholders have legitimate concerns: Operations isn’t being difficult - downtime really is expensive. CFO isn’t being cheap - security competes with other needs. Understanding their perspective makes you more effective.
Prioritization is complex: Severity alone doesn’t determine priority. Operational impact, cost, feasibility, and business context all matter.
Communication is a skill: Translating technical findings to business language takes practice. Repetition works.
The Patrician is always watching: In real assessments, there’s always an ultimate decision-maker. Often analytical, strategic, and not easily impressed. Your recommendations must make sense to them.
Answer participant questions.
Closing: You’ve experienced the full cycle of OT pentesting in three hours. The technical work: accessible with protocol knowledge. The stakeholder work: difficult even for experienced professionals. Keep practicing both. The simulator is available. The documentation is comprehensive. The skills you practiced today will serve you in real assessments.
Thank you for participating. Go forth and convince sceptical stakeholders.
Adaptation guidance¶
Shorter format (2 hours)¶
Reduce Phase 1 to 60 minutes (provide more guidance upfront)
10 minutes per team presentation
20-minute debrief
Skip some stakeholder roles (keep Patrician, Operations, CFO)
Longer format (4 hours)¶
Add 30-minute introduction to OT security concepts
Extend Phase 1 to 120 minutes
20 minutes per team with more stakeholder depth
Add written report requirement
More extensive debrief with technical deep dives
Different audiences¶
Junior professionals:
Provide more technical guidance during Phase 1
Softer stakeholder questioning in Phase 2
More teaching during debrief
Senior professionals:
Minimal guidance during Phase 1
Aggressive stakeholder questioning
Advanced scenarios (zero-day usage, insider threats, supply chain)
Discussion of how to build security programs, not just find vulnerabilities
Mixed IT/OT audience:
Pair IT and OT professionals in teams
Emphasise translation between perspectives
Focus on collaboration and mutual understanding
Executive audience:
They play stakeholders, technical teams play pentesters
Reverse the learning: executives experience pentester perspective
Focus on decision-making under uncertainty
Remote delivery¶
Technical considerations:
Cloud-hosted simulator instances
Screen sharing for demonstrations
Breakout rooms for team work
Virtual whiteboard for collaboration
Recording sessions for review
Facilitation adjustments:
More structured turn-taking
Explicit time signals (harder to read room remotely)
Chat for questions
Smaller teams (2-3 people)
Troubleshooting guide¶
Technical issues¶
Problem: Simulator won’t start Solution: Have cloud instances ready, or pair teams to share working instances
Problem: Scripts fail during demonstration Solution: Use pre-recorded videos. “The attack succeeded - focus on explaining impact.”
Problem: Network/firewall blocks ports Solution: Test beforehand. Have alternative port configurations ready.
Facilitation issues¶
Problem: Teams finish Phase 1 too quickly
Solution: “Find three more attack paths. Can you demonstrate persistence? Can you evade detection?”
Problem: Teams are stuck and frustrated
Solution: Provide specific hints. “Try the modbus_coil_register_snapshot script on port 10502.”
Problem: Stakeholder roleplay becomes too adversarial
Solution: “Let’s pause. Remember, we’re preparing you for realistic conversations, not attacking you personally. This is practice.”
Problem: One team dominates discussion
Solution: “That’s a great point from Team 1. Team 3, what’s your perspective?”
Problem: Participants resist roleplay
Solution: “I know roleplay feels artificial. But stakeholder communication is a learnable skill. The only way to improve is practice. Trust the process.”
Success metrics¶
You will know the workshop succeeded when:
Participants struggle during Phase 2 (that’s the point)
Technical discussion happens naturally during Phase 1
Stakeholder questioning feels realistic and challenging
Teams improve their communication between early and later presentations
Debrief includes insights about communication, not just technical findings
Participants say: “I had no idea stakeholder communication was this hard”
Participants want to practice more
Follow-up recommendations¶
For participants:
Practice with the simulator regularly
Write practice reports for non-technical audiences
Study real OT pentesting reports
Attend OT security conferences
Join industrial security communities
For organizations:
Run quarterly simulations with different scenarios
Include operations staff in security exercises
Practice cross-functional communication
Build empathy between security and operations
Use scenarios to develop incident response procedures
“The art of controlling others is to tell them what they want to hear in a way that makes them do what you want them to do.” - Lord Vetinari
Which, in security consulting, means: frame your findings in terms of stakeholder concerns, and they’ll implement your recommendations willingly (sometimes).