Monitors and detects unauthorized write operations, anomalous function codes, and command injection attacks against Modbus TCP/RTU protocols in industrial environments.
This skill empowers Claude to analyze and secure Industrial Control Systems (ICS) by identifying malicious Modbus protocol traffic. It leverages deep packet inspection and baseline validation to detect sophisticated threats like the FrostyGoop attack, unauthorized register modifications, and broadcast write floods. It is an essential utility for OT Security Operations Centers (SOC) and incident responders needing to validate the integrity of SCADA and PLC communications without disrupting sensitive operations.
主な機能
01Identification of dangerous broadcast write commands (Unit ID 0)
020 GitHub stars
03Deep packet inspection for Modbus TCP/RTU protocol frames
04Baseline-driven anomaly detection for function codes and register ranges
05Detection of unauthorized Modbus masters and write operations
06Rate-limiting analysis to identify write-flood attacks
ユースケース
01Investigating unauthorized PLC configuration changes during incident response
02Monitoring OT networks for FrostyGoop-style operational impact attacks
03Validating Modbus communication baselines in SCADA environments