IncidentResponsev2

Scan ICS Equipment Ports

Task Scan ICS Equipment Ports

2.04 – Active_Host_and_Service_Enumeration
2.01 – Create a list of active IP addresses
2.05 – Create a list of active IP addresses with key ports included
2.07 – Scan ICS Equipment Ports
2.06 – Scan all ports of all hosts on given network segment

Conditions

Given a suspected compromised network segment(s), access to a system that can access and scan the identified network segment(s), and network scanning software included in the team’s incident response kit.

Operator Note: ICS environments are extremely sensitive. Nmap scans can cause device failure or process disruption. Always coordinate with system owners and obtain written approval.

Standards

Operator Note: Use -T1 or -T2 scan timing options in Nmap to reduce scan aggressiveness when targeting ICS environments.

End State

All active hosts, ports and services are carefully enumerated based on the specific sub-task accomplished and any anomalies or mis-configurations are identified.

Operator Note: Carefully review ICS results with facility or SCADA engineers to validate accuracy and rule out false positives.

Manual Steps

A list of IP ranges can be provided by using the -f IPRanges option; otherwise, a range can be specified with -i IPRange.
For each BD, the script will need to be ran.
The script will need to be marked executable before running:

chmod +x NmapScript.sh
Selection:> 1
[+] Starting Nmap...
Selection:> 2
[+] 192.168.69.1 is live!
Selection:> 3
[+] Starting Nmap...
Selection:> 4
[!] It is possible for SCADA devices to fail with an Nmap scan, do you want to continue? Y
[+] Starting Nmap 7.80 ( https://nmap.org )
[+] Nmap done: 256 IP addresses (6 hosts up) scanned in 3.41 seconds

Operator Note: This mode is targeted for ICS systems. However, even so, it may disrupt sensitive equipment. Use the --scan-delay and -T0 or -T1 flags in custom scans if needed.

Selection:> 5
[+] Starting Nmap...

Dependencies

sudo apt install nmap

Operator Note: Windows: choco install nmap or official installer.

Other available tools

Operator Note: These tools are NOT recommended for ICS scanning — only use Nmap or highly controlled protocols for ICS/SCADA equipment.

References

NMAP Site
LAN Spy
NMAP Man Pages
Nmap Network Scanning Book


Operator Recommendations and Additional Tools

Operator Checklist

Tools by Platform

Platform Tool Purpose
Universal Nmap, NmapScript.sh Primary ICS scan tool (use with caution)
Windows/Linux/macOS Nmap CLI with timing/scanning options Low and slow ICS scanning
Mobile Fing NOT recommended for ICS, use only for basic discovery if permitted

Nmap low impact ICS scan:

nmap -sS -p 1-1024 --scan-delay 1s -T1 192.168.1.0/24

Nmap SCADA targeted (Modbus/TCP):

nmap -sU -p 502 --script modbus-discover 192.168.1.0/24

Operator Note: Use SCADA-specific NSE scripts carefully and only with approval.

Best Practices


Revision History

Date Version Description Author
2025-05-02 1.8 Full original + enriched ICS/SCADA operator guidance and recommendations Leo