We are conducting a small embedded power systems security exercise at Charles Darwin
University Control Systems Test Facility (CSTF) on the Laot System designed for protecting
critical infrastructure (see https://trustworthy.systems/projects/TS/laot
The exercise will involve penetration testing with the targets being a generator
controlled by a Comap controller and a small nuclear reactor simulator (see
These devices will for parts of the exercise be protected by the Laot system.
There will be no cost to participants. All material including reports will be provided to
all participants at the end.
Keywords: seL4, Laot, MODBUS, Security, Protection of Critical Infrastructure, Hybrid
Power Systems, AUUG
What: Laot is a seL4-based system for protecting critical infrastructure.
Why: The exercise is intended to test the system and provide a useful exercise for the
penetration testing on industrial control systems.
When: Over the next 2-4 weeks.
How: Send an email or ring Phil he will give you an exercise brief and timings. Any
general enquires are also welcome via the same means.
Where: Remote for participants but the lab is in Darwin, Northern Australia. Local Darwin
participants will be provided appropriate Darwin food and drink.
Who: The 3 members of the Laot team are Gernot Heiser, Ben Leslie and Phil Maker.
What: the exercise will be conducted over a 72h period in order to document and describe
vulnerabilities in a variety of systems.
Please read the Laot and little moata references above and contact Phil.
In terms of background you will need to know the usual kali penetration tools (nmap, ...)
and have an idea about either C or MODBUS. We will provide example code and exercise
phoneemail: <philmakerphone(a)gmail.com> -- email to phone (fastest)
phone: +61 (0)447 630 229