{"id":319,"date":"2025-09-24T19:52:01","date_gmt":"2025-09-24T18:52:01","guid":{"rendered":"https:\/\/mamdouh.de\/?p=319"},"modified":"2025-09-24T19:53:20","modified_gmt":"2025-09-24T18:53:20","slug":"system-profiling","status":"publish","type":"post","link":"https:\/\/mamdouh.de\/index.php\/2025\/09\/24\/system-profiling\/","title":{"rendered":"System Profiling"},"content":{"rendered":"\n<p>\ud83d\udd38Before any OT\/ICS risk assessment, profile the system.<br><br>\ud83d\udd38System profiling = a deliberate inventory of components, connections, and weak points of the complete System under Consideration (SuC) so your risk model is built on facts, not assumptions.<br><br>\ud83d\udd38In practice, that means mapping interfaces, routes, listeners, identities, and services first. As shown in the depicted PDF file, I compiled a concise Linux\/Windows cheat sheet for this phase.<br><br>\ud83d\udd38Use these commands: if the OT asset runs a general-purpose OS (e.g., HMI\/SCADA servers, engineering workstations, jump hosts, historians).<\/p>\n\n\n\n<iframe\n  src=\"https:\/\/mamdouh.de\/wp-content\/uploads\/2025\/09\/System_Profiling_Cheat_Sheet.pdf#zoom=FitH\"\n  width=\"100%\"\n  height=\"800\"\n  style=\"border:0;\"\n  loading=\"lazy\"\n><\/iframe>\n<p><a href=\"https:\/\/mamdouh.de\/wp-content\/uploads\/2025\/09\/System_Profiling_Cheat_Sheet.pdf\" target=\"_blank\" rel=\"noopener\">Download the PDF<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\ud83d\udd38Before any OT\/ICS risk assessment, profile the system. \ud83d\udd38System profiling = a deliberate inventory of components, connections, and weak points of the complete System under Consideration&#46;&#46;&#46;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-319","post","type-post","status-publish","format-standard","hentry","category-cybersecurity"],"_links":{"self":[{"href":"https:\/\/mamdouh.de\/index.php\/wp-json\/wp\/v2\/posts\/319","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mamdouh.de\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mamdouh.de\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mamdouh.de\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mamdouh.de\/index.php\/wp-json\/wp\/v2\/comments?post=319"}],"version-history":[{"count":1,"href":"https:\/\/mamdouh.de\/index.php\/wp-json\/wp\/v2\/posts\/319\/revisions"}],"predecessor-version":[{"id":321,"href":"https:\/\/mamdouh.de\/index.php\/wp-json\/wp\/v2\/posts\/319\/revisions\/321"}],"wp:attachment":[{"href":"https:\/\/mamdouh.de\/index.php\/wp-json\/wp\/v2\/media?parent=319"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mamdouh.de\/index.php\/wp-json\/wp\/v2\/categories?post=319"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mamdouh.de\/index.php\/wp-json\/wp\/v2\/tags?post=319"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}