{"id":62501,"date":"2023-02-06T14:53:56","date_gmt":"2023-02-06T06:53:56","guid":{"rendered":"https:\/\/version-2.com\/?p=62501"},"modified":"2024-09-13T16:31:45","modified_gmt":"2024-09-13T08:31:45","slug":"yes-we-scan-how-to-actively-scan-industrial-control-systems-safely","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2023\/02\/yes-we-scan-how-to-actively-scan-industrial-control-systems-safely\/","title":{"rendered":"Yes we scan: How to actively scan industrial control systems safely"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"62501\" class=\"elementor elementor-62501\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4da8c5f9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4da8c5f9\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;decf9c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-133ba185\" data-id=\"133ba185\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fc2da8d post-content elementor-widget elementor-widget-text-editor\" data-id=\"fc2da8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Many OT engineers still believe that active scanning is not safe in OT environments. However, their assumptions don\u2019t have a legitimate basis.\u00a0<\/p><p>Yes, regular network and vulnerability scanners can cause devices to act erratically. Printers start spewing out pages. Embedded systems freeze up or reboot. But it doesn\u2019t have to be this way. If you observe a few key aspects and use a purpose-built scanner, actively detecting ICS and IoT equipment is entirely safe. runZero has proven that active scanning is safe, and it\u2019s evident across numerous industries.<\/p><h2 id=\"digging-into-issues-with-legacy-scanners\">Digging into issues with legacy scanners <i class=\"fa fa-fw fa-link text-light smallx95\"><\/i><\/h2><p>To better understand the challenges of active scanning, we analyzed why legacy vulnerability and network scanners destabilize systems. We found four different root causes:<\/p><ul><li><a href=\"#malformed-ip-traffic\">Malformed IP traffic<\/a><\/li><li><a href=\"#security-probes\">Security probes<\/a><\/li><li><a href=\"#heavy-scan-traffic-per-device\">Heavy scan traffic per device<\/a><\/li><li><a href=\"#snowflake-devices\">Snowflake devices<\/a><\/li><\/ul><p>Let\u2019s dig into each issue.<\/p><h3 id=\"malformed-ip-traffic\">Malformed IP traffic <i class=\"fa fa-fw fa-link text-light smallx95\"><\/i><\/h3><p>Legacy scanners often send intentionally malformed IP traffic to identify different flavors of operating systems. A robust TCP\/IP stack on a Windows or Linux system will process the malformed traffic and respond in a specific manner that helps the scanner identify the flavor of the operating system.<\/p><p>Embedded systems often use legacy or custom TCP\/IP stacks. When scanned with malformed IP traffic, these devices can freeze up or reboot because the unexpected traffic causes errors that are handled incorrectly by the stack.<\/p><h3 id=\"security-probes\">Security probes <i class=\"fa fa-fw fa-link text-light smallx95\"><\/i><\/h3><p>Vulnerability scanners send security probes, such as SQL injection exploits, to detect vulnerabilities in target systems. Embedded systems are often written without enough error handling built in, so the problem is similar as with malformed IP traffic: receiving unexpected network traffic can cause the devices to react erratically.<\/p><h3 id=\"heavy-scan-traffic-per-device\">Heavy scan traffic per device <i class=\"fa fa-fw fa-link text-light smallx95\"><\/i><\/h3><p>Legacy vulnerability and network scanners scan a large number of ports and can send several probes per port. This traffic is all sent to the end node in rapid succession. When all ports and probes are completed, the scanner moves on to the next host.<\/p><p>Enterprise IT hardware and mainstream operating systems can handle a lot of network traffic at once. OT equipment often doesn\u2019t have a lot of processing power. Heavy scan traffic can overload the device, causing it to slow down or freeze up. In many industrial control applications, response times are critical. Even a slow down can have adverse effects on the overall environment.<\/p><h3 id=\"snowflake-devices\">Snowflake devices <i class=\"fa fa-fw fa-link text-light smallx95\"><\/i><\/h3><p>When scanners avoid malformed IP traffic, security probes, and heavy scan traffic, most of the issues on OT networks can be resolved. However, there are a handful of particularly flakey devices that become unstable with even the most regular scan traffic. Serial-ethernet connectors, also known as print servers, tend to be among the worst \u201csnowflake\u201d devices.<\/p><h2 id=\"passive-monitoring-is-expensive-and-lacks-accuracy\">Passive monitoring is expensive and lacks accuracy <i class=\"fa fa-fw fa-link text-light smallx95\"><\/i><\/h2><p>That\u2019s why by sticking with passive monitoring solutions instead of active scanning, OT engineers are inviting these issues into their projects:<\/p><ul><li><strong>Longer deployment cycles<\/strong> &#8211; Connecting to SPAN ports or TAP appliances is more complex than deploying a software scanner in the environment.<\/li><li><strong>Higher cost<\/strong> &#8211; Requires lots of disk space and processing power, usually in the form of costly hardware appliances.<\/li><li><strong>Missing assets<\/strong> &#8211; You can\u2019t inventory assets that are not communicating.<\/li><li><strong>Missing detail<\/strong> &#8211; Missing ports that are not communicating.<\/li><li><strong>Low accuracy<\/strong> &#8211; Spotty accuracy because passive monitoring is limited to analyzing existing traffic.<\/li><li><strong>Not future proof<\/strong> &#8211; The increasing amount of encrypted traffic makes passive monitoring solutions less viable over time.<\/li><\/ul><p>Let\u2019s take a look at the flip side and run through the key gains of leveraging an active scanning approach.<\/p><h2 id=\"how-to-safely-scan-ics-environments\">How to safely scan ICS environments <i class=\"fa fa-fw fa-link text-light smallx95\"><\/i><\/h2><p>While legacy scanners cannot be used safely on OT assets, modern purpose-built scanners can safely scan ICS environments by following a few basic rules:<\/p><ul><li><strong>Use only standard-conforming IP traffic<\/strong> &#8211; All traffic sent from the scanner must be completely RFC compliant.<\/li><li><strong>No security probes<\/strong> &#8211; Very easy. Just don\u2019t use them.<\/li><li><strong>Throttle traffic per host<\/strong> &#8211; Limit the number of packets sent to each node. A good starting point is 40 packets per second. The best scanners keep overall scan times short by sending all traffic round-robin on the network when the threshold is reached.<\/li><li><strong>Probe for snowflakes<\/strong> &#8211; Detect snowflake devices before running a full port scan and adapt the scan for the particular model.<\/li><\/ul><p>Now, let\u2019s take a look at how these rules have been applied across different industries and what organizations have been able to uncover as a result.<\/p><h2 id=\"active-scanning-is-a-proven-methodology-across-industries\">Active scanning is a proven methodology across industries <i class=\"fa fa-fw fa-link text-light smallx95\"><\/i><\/h2><p>Doing research in a lab is one thing, but proving a methodology in the field is another. This approach has been tested and deployed in production environments across many industries, including:<\/p><ul><li>Building automation<\/li><li>Consumer and B2B electronics manufacturing<\/li><li>Biomedical device manufacturing<\/li><li>Telecommunications<\/li><li>Broadcasting<\/li><li>Universities (e.g., research instrumentation)<\/li><li>Data center technology<\/li><li>Transportation (e.g., train signals)<\/li><li>City and state infrastructure (e.g., street signs, surveillance cameras)<\/li><li>National labs<\/li><li>Apparel manufacturing<\/li><li>Car manufacturing<\/li><li>Aerospace manufacturing<\/li><li>Building material manufacturing<\/li><li>Retail stores (e.g., POS systems, HVAC)<\/li><li>Cattle and fish farms<\/li><li>Utilities<\/li><li>Saw mills<\/li><li>Hospitals<\/li><li>ICS equipment manufacturers<\/li><\/ul><p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/www.runzero.com\/img\/posts\/ot-devices.png\" width=\"811\" height=\"453\" \/><\/p><p>Some examples of equipment found in these environments include the following device types:<\/p><ul><li>PLCs<\/li><li>Industrial control systems<\/li><li>Serial-Ethernet converters<\/li><li>HMI\/HMI controllers\/HDI<\/li><li>BACNET devices<\/li><li>Device servers<\/li><li>Surveillance cameras<\/li><li>Terminal servers<\/li><li>Access control systems<\/li><li>Intercoms<\/li><li>KVMs<\/li><li>Rugged WAP<\/li><\/ul><h2 id=\"get-started-with-active-scanning-of-industrial-control-systems\">Get started with active scanning of industrial control systems <i class=\"fa fa-fw fa-link text-light smallx95\"><\/i><\/h2><p>You wouldn\u2019t deploy a new piece of software across all of your devices without testing it first. The same is true for active scanning in ICS environments. As you\u2019re considering rolling out active scanning technology, here are some tips to get you started:<\/p><ol><li><strong>Pick a purpose-built modern scanner<\/strong> &#8211; It\u2019s unlikely that you will be successful with legacy network or vulnerability scanners as they send unsafe traffic. Pick a modern, purpose-built solution, such as <a href=\"\/product\/overview\">runZero<\/a>.<\/li><li><strong>Start small and slow<\/strong> &#8211; If you have a small handful of devices in a lab, start there. Otherwise, pick a handful of devices to scan during a maintenance window and check their operational status afterwards. If you know you have snowflake devices, include them in your first scan. If it doesn\u2019t work for them, it won\u2019t work for the full network. Start with a very low network scan frequency, such as 1,000 packets per second from the scanner and 20 packets per second per host.<\/li><li><strong>Try a bigger segment<\/strong> &#8211; Once you are comfortable with a handful of devices, scan a larger network segment during a maintenance window.<\/li><li><strong>Plan your deployment<\/strong> &#8211; Deploy one scanner per network segment. Don\u2019t scan through any network devices that filter traffic, otherwise the accuracy of your results will be impacted. Don\u2019t scan through stateful devices because each IP\/port connection will create another session and you may overload the device. Deploy the scanners on appropriate hardware or virtual machines. For a large network segment, you may want a dedicated host. For a medium-sized network, you can use an existing host. For small environments, you can even use a Raspberry Pi.<\/li><\/ol><p>Hopefully, these tips will help you eradicate outdated and inaccurate perceptions against active scanning. Utilize these recommended best practices and you\u2019ll be able to safely detect ICS and IoT devices via active scanning. runZero continues to prove this over and over again across multiple industries.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8085a61 post-content elementor-widget elementor-widget-shortcode\" data-id=\"8085a61\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"55060\" class=\"elementor elementor-55060\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6b25dc0d elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"6b25dc0d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3cc1b37d\" data-id=\"3cc1b37d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-52c4a230 elementor-widget elementor-widget-text-editor\" data-id=\"52c4a230\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About runZero<\/strong><br \/>runZero, a network discovery and asset inventory solution, was founded in 2018 by HD Moore, the creator of Metasploit. HD envisioned a modern active discovery solution that could find and identify everything on a network\u2013without credentials. As a security researcher and penetration tester, he often employed benign ways to get information leaks and piece them together to build device profiles. Eventually, this work led him to leverage applied research and the discovery techniques developed for security and penetration testing to create runZero.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Many OT engineers still believe that active scanning is [&hellip;]<\/p>\n","protected":false},"author":148637484,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1075,976,61],"tags":[977,1076],"class_list":["post-62501","post","type-post","status-publish","format-standard","hentry","category-year2023","category-runzero","category-press-release","tag-runzero","tag-1076"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Yes we scan: How to actively scan industrial control systems safely - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.runzero.com\/blog\/how-to-safely-scan-ot-assets\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Yes we scan: How to actively scan industrial control systems safely - Version 2\" \/>\n<meta property=\"og:description\" content=\"Many OT engineers still believe that active scanning is [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.runzero.com\/blog\/how-to-safely-scan-ot-assets\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-06T06:53:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-13T08:31:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.runzero.com\/img\/posts\/ot-devices.png\" \/>\n<meta name=\"author\" content=\"versionpan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"versionpan\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.runzero.com\\\/blog\\\/how-to-safely-scan-ot-assets\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/02\\\/yes-we-scan-how-to-actively-scan-industrial-control-systems-safely\\\/\"},\"author\":{\"name\":\"versionpan\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/103ffe36f7fd34a1cc126a30431b94d8\"},\"headline\":\"Yes we scan: How to actively scan industrial control systems safely\",\"datePublished\":\"2023-02-06T06:53:56+00:00\",\"dateModified\":\"2024-09-13T08:31:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/02\\\/yes-we-scan-how-to-actively-scan-industrial-control-systems-safely\\\/\"},\"wordCount\":1229,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.runzero.com\\\/blog\\\/how-to-safely-scan-ot-assets\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.runzero.com\\\/img\\\/posts\\\/ot-devices.png\",\"keywords\":[\"runZero\",\"2023\"],\"articleSection\":[\"2023\",\"runZero\",\"Press Release\"],\"inLanguage\":\"zh-HK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2023\\\/02\\\/yes-we-scan-how-to-actively-scan-industrial-control-systems-safely\\\/\",\"url\":\"https:\\\/\\\/www.runzero.com\\\/blog\\\/how-to-safely-scan-ot-assets\\\/\",\"name\":\"Yes we scan: How to actively scan industrial control systems safely - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.runzero.com\\\/blog\\\/how-to-safely-scan-ot-assets\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.runzero.com\\\/blog\\\/how-to-safely-scan-ot-assets\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.runzero.com\\\/img\\\/posts\\\/ot-devices.png\",\"datePublished\":\"2023-02-06T06:53:56+00:00\",\"dateModified\":\"2024-09-13T08:31:45+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.runzero.com\\\/blog\\\/how-to-safely-scan-ot-assets\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.runzero.com\\\/blog\\\/how-to-safely-scan-ot-assets\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/www.runzero.com\\\/blog\\\/how-to-safely-scan-ot-assets\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.runzero.com\\\/img\\\/posts\\\/ot-devices.png\",\"contentUrl\":\"https:\\\/\\\/www.runzero.com\\\/img\\\/posts\\\/ot-devices.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.runzero.com\\\/blog\\\/how-to-safely-scan-ot-assets\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Yes we scan: How to actively scan industrial control systems safely\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/103ffe36f7fd34a1cc126a30431b94d8\",\"name\":\"versionpan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g\",\"caption\":\"versionpan\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/versionpan\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Yes we scan: How to actively scan industrial control systems safely - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.runzero.com\/blog\/how-to-safely-scan-ot-assets\/","og_locale":"zh_HK","og_type":"article","og_title":"Yes we scan: How to actively scan industrial control systems safely - Version 2","og_description":"Many OT engineers still believe that active scanning is [&hellip;]","og_url":"https:\/\/www.runzero.com\/blog\/how-to-safely-scan-ot-assets\/","og_site_name":"Version 2","article_published_time":"2023-02-06T06:53:56+00:00","article_modified_time":"2024-09-13T08:31:45+00:00","og_image":[{"url":"https:\/\/www.runzero.com\/img\/posts\/ot-devices.png","type":"","width":"","height":""}],"author":"versionpan","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"versionpan","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"7 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.runzero.com\/blog\/how-to-safely-scan-ot-assets\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2023\/02\/yes-we-scan-how-to-actively-scan-industrial-control-systems-safely\/"},"author":{"name":"versionpan","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/103ffe36f7fd34a1cc126a30431b94d8"},"headline":"Yes we scan: How to actively scan industrial control systems safely","datePublished":"2023-02-06T06:53:56+00:00","dateModified":"2024-09-13T08:31:45+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2023\/02\/yes-we-scan-how-to-actively-scan-industrial-control-systems-safely\/"},"wordCount":1229,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.runzero.com\/blog\/how-to-safely-scan-ot-assets\/#primaryimage"},"thumbnailUrl":"https:\/\/www.runzero.com\/img\/posts\/ot-devices.png","keywords":["runZero","2023"],"articleSection":["2023","runZero","Press Release"],"inLanguage":"zh-HK"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2023\/02\/yes-we-scan-how-to-actively-scan-industrial-control-systems-safely\/","url":"https:\/\/www.runzero.com\/blog\/how-to-safely-scan-ot-assets\/","name":"Yes we scan: How to actively scan industrial control systems safely - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.runzero.com\/blog\/how-to-safely-scan-ot-assets\/#primaryimage"},"image":{"@id":"https:\/\/www.runzero.com\/blog\/how-to-safely-scan-ot-assets\/#primaryimage"},"thumbnailUrl":"https:\/\/www.runzero.com\/img\/posts\/ot-devices.png","datePublished":"2023-02-06T06:53:56+00:00","dateModified":"2024-09-13T08:31:45+00:00","breadcrumb":{"@id":"https:\/\/www.runzero.com\/blog\/how-to-safely-scan-ot-assets\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.runzero.com\/blog\/how-to-safely-scan-ot-assets\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/www.runzero.com\/blog\/how-to-safely-scan-ot-assets\/#primaryimage","url":"https:\/\/www.runzero.com\/img\/posts\/ot-devices.png","contentUrl":"https:\/\/www.runzero.com\/img\/posts\/ot-devices.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.runzero.com\/blog\/how-to-safely-scan-ot-assets\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Yes we scan: How to actively scan industrial control systems safely"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/103ffe36f7fd34a1cc126a30431b94d8","name":"versionpan","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/72541e15024f6716236decb252e7488d4a7359d4df6f8506b01f447174f92c7c?s=96&d=identicon&r=g","caption":"versionpan"},"url":"https:\/\/version-2.com\/zh\/author\/versionpan\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-gg5","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/62501","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/148637484"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=62501"}],"version-history":[{"count":11,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/62501\/revisions"}],"predecessor-version":[{"id":65043,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/62501\/revisions\/65043"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=62501"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=62501"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=62501"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}