Last Day to Save $400 on Cyber Security Training at SANS New York City Summer 2018!

NetWars: ICS NetWars



ICS NetWars is a suite of hands-on, interactive learning scenarios that enable Operational Technology (OT) security professionals to develop and master the real-world, in-depth skills they need to defend real-time systems. Designed to be accessible to a broad level of player skill ranges, levels 1 and 2 were introduced in 2017 and levels 3 to 4 were introduced in March at the ICS Summit Orlando 2018.



"My favorite part of ICS NetWars was that both IT and OT were in one game. Nice job!" - Mike Hoffman

ICS NetWars Scenario

The Delicious Edible Foods (DEF) is a fictional multinational food manufacturing company specializing in cookie and snack food products. The company utilizes highly automated and secret manufacturing processes which have contributed to extraordinary growth and profits. Recently, DEF has begun receiving customer complaints about "mixed bag" packaging which included random cookie types mixed into packages where they didn't belong presenting serious health risks to consumers with food allergies. An FDA investigation is underway and lawsuits have already been filed. Your mission: identify if DEF has been compromised, defend the operation environment and reinstate confidence in the safety and quality of the process.

Level 1

  • ICS NetWars provides participants with a challenging scenario facing an operational process control environment. Players will be challenged to develop a full understanding of the environment, equipment, infrastructure, and vulnerabilities throughout Level 1 play.

Level 2

  • As players enter into Level 2, they will access 100's of data artifacts from within the simulated process environment and will need to perform analysis, forensics, and incident response activities in order to complete Level 2.

Level 3

  • Players are provided a series of host and network data sets as well as virtual machines to use as they perform direct analysis of ICS specific adversary activity within a process environment.

Level 4

  • Players will directly interact with a live process environment within the DEF cookie factory, as they work to validate and verify the integrity of the control system environment.

Level 5

  • Factory vs factory competition model will be developed at a later date.

Adversary Actions

  • Spear Phishing
  • Command and Control
  • Credential theft
  • Lateral and vertical movement
  • Security configuration modification
  • Process manipulation
  • ICS specific malware

Blue Team (Defender) Actions

Participants play the role of Incident Responder analyzing collected artifacts including system event and security logs, firewall logs, network diagrams, system as-built information and many other items to answer a series of questions. The goal is to identify what happened, how to stop the damage, and how to restore consistency and reliability to the process.

For more information about ICS NetWars email us at ics@sans.org.