Network forensics investigation of a PCAP captured from a monitoring workstation in an industrial chemical plant DMZ. The scenario involves suspected threat actor Glacier targeting OT/SCADA infrastructure — a critical concern given the potential for operational disruption in an industrial environment.
The capture is from a dual-homed workstation sitting at the boundary between the IT network and the DMZ where SCADA systems operate.
Opening the capture in Wireshark, the Statistics → Conversations view immediately identifies the host with the highest traffic volume — 192.168.1.120. This is the monitoring workstation, and as a machine with both internet access and DMZ connectivity it must have two network interfaces.
Pivoting on this, filtering for traffic from the second network space reveals the DMZ-side IP of the same host: 192.168.90.5.
MITRE: T1590 — Gather Victim Network Information
Before any targeted activity, ARP broadcast traffic visible in the capture indicates an ARP scan was performed — a layer 2 host discovery technique used to enumerate live hosts on the local segment before committing to a more intrusive port scan.
Following the ARP scan, searching through the capture for nmap signatures surfaces the tool in the info column of a POST request:
POST /sdk HTTP/1.1

Nmap’s /sdk probe is a characteristic fingerprint — it queries VMware vSphere SDK endpoints as part of its service detection routines. This confirms active network reconnaissance was conducted against the DMZ from an attacker-controlled position.
The nmap scan also identifies the other endpoint present in the DMZ: 192.168.90.3.
MITRE: T1595 — Active Scanning MITRE: T1595.001 — Scanning IP Blocks
TCP traffic analysis from the nmap scan results confirms two open ports on 192.168.90.3:
HTTP is running on the higher port (8080), exposing a web interface to the DMZ network.
Filtering for HTTP POST requests from the host’s DMZ interface reveals login traffic to the SCADA system:
ip.addr == 192.168.90.5 && http.request.method == POST

The login URL and credentials are transmitted in cleartext over HTTP — a critical security failure in an OT environment:
URL: hxxp[://]192[.]168[.]90[.]5:8080/ScadaBR/login[.]htm
Credentials: admin:admin
ScadaBR is an open source SCADA platform. Default credentials (admin:admin) were never changed — a textbook industrial security failure that gives an attacker immediate access to process control interfaces.
MITRE: T1190 — Exploit Public-Facing Application MITRE: T1552.001 — Unsecured Credentials: Credentials In Files
After the credentials are submitted, filtering for HTTP 302 responses identifies the redirect packet that follows successful authentication:
http.response.code == 302

Packet 23260 contains the 302 redirect response — confirming successful login to the ScadaBR interface and marking the point at which the attacker gained access to the SCADA control panel.
MITRE: T1133 — External Remote Services
| Type | Value |
|---|---|
| Host IP (IT side) | 192[.]168[.]1[.]120 |
| Host IP (DMZ side) | 192[.]168[.]90[.]5 |
| DMZ Target | 192[.]168[.]90[.]3 |
| Open Ports | 8009, 8080 |
| SCADA Platform | ScadaBR |
| Login URL | hxxp[://]192[.]168[.]90[.]5:8080/ScadaBR/login[.]htm |
| Credentials | admin:admin |
| Post-Auth Redirect Packet | 23260 |
| Technique | ID | Notes |
|---|---|---|
| Gather Victim Network Info | T1590 | Dual-homed host identified via traffic analysis |
| Active Scanning | T1595 | ARP scan then nmap against DMZ segment |
| Scanning IP Blocks | T1595.001 | ARP host discovery pre-nmap |
| Exploit Public-Facing App | T1190 | ScadaBR web interface exposed on port 8080 |
| Unsecured Credentials | T1552.001 | Default admin:admin credentials never changed |
| External Remote Services | T1133 | SCADA interface accessible from DMZ |
admin:admin on internet-accessible SCADA infrastructure is a critical finding. Industrial control systems are increasingly targeted and default credential hardening is a baseline control that is frequently missing