HOW CONTROL SYSTEMS GET HACKED
TROUBLESHOOTING COMMANDS
TROUBLESHOOTING TOOLS
FIREWALLS & PORT SECURITY
SMTP & ALERTING
100

Why are BAS systems common cyberattack targets?

They control critical systems and often have weak security

100

Which command checks if a device is reachable on the network?

ping

100

What tool captures live network traffic for analysis?

Wireshark

100

What identifier does port security use to allow or deny access?

MAC address

100

What does SMTP stand for?

Simple Mail Transfer Protocol

200

What credential issue is commonly exploited by attackers?

Default or weak passwords

200

Which command displays IP address, subnet mask, gateway, and DNS info?

ipconfig /all

200

What Trane tool captures BACnet traffic inside Synchrony?

BACnet Capture Tool

200

What is the default port security violation action?

Shutdown

200

Which port is commonly used for unencrypted SMTP?

25

300

Which BAS protocol is often exploited due to lack of encryption?

BACnet/IP

300

Which command maps IP addresses to MAC addresses?

arp -a

300

What tool helps locate hidden or unlabeled cables?

Tone generator

300

Which port security mode silently drops unauthorized devices?

Protect mode

300

How is SMTP used in building automation systems?

Sending alarms and reports

400

What is control manipulation in a cyberattack?

Changing setpoints, schedules, or disabling alarms

400

Which command traces the path packets take across networks?

tracert

400

What tool quickly scans subnets to identify devices?

Advanced IP Scanner

400

Why is outbound-only traffic preferred for remote BAS access?

It avoids inbound attack paths

400

Which email protocol leaves messages on the server?

IMAP

500

What did the Target breach demonstrate about BAS security?

BAS access can lead to corporate network compromise

500

Why should troubleshooting always start at the physical layer?

Power and cabling issues are the most common failures

500

Why use packet capture when devices appear online but do not respond?

To identify dropped packets or protocol errors

500

What firewall strategy blocks all traffic except what is required?

Default deny

500

What should be checked first if BAS email alarms fail?

SMTP server, port, and credentials

M
e
n
u