Breaking Without Bricking: Safe Vulnerability Research in OT Environments

November 12, 2025 @ 11:10 - 11:50

  • Main Track

About Session

Technical Level: Beginner/Intermediate

Performing a security assessment (aka. penetration testing) on Operational Technology (OT) systems presents a unique set of challenges – especially when the target is a one-of-a-kind prototype. In this session, we’ll explore how to conduct effective, non-destructive security assessments on fragile or irreplaceable OT devices on loan.

Using a real-world case study (under NDA), we’ll demonstrate how our team approached third-party validation on a highly sensitive device. With destructive testing off the table, we leveraged virtualization techniques to create a safe and flexible testing environment. This enabled us to exploit the device, in a live configuration—without risking hardware failure.

We’ll walk through the OT pen testing methodology, highlight key differences from IT security testing, and discuss how to manage risk, scope, and tooling in these constrained environments.

The session will conclude with a live demonstration on a Moxa Ethernet-to-Serial device, showcasing practical techniques for safe and efficient vulnerability research in the OT space.

The delegates would gain a new insight combined with a practical demonstration of why some previous restraints may be overcome by using this approach.

Speakers

Mikael Vingaard

Mikael Vingaard

Senior OT Security Consultant, ICSRange
Jens Nielsen

Jens Nielsen

Senior OT Security Researcher, ICSRange