Source: GitHub – Labshock | Demo Video
Labshock is an ICS/OT security lab that allows users to simulate large-scale industrial control systems without physical hardware. In a recent demonstration, Zakhar Bernhardt showcased how to scale Labshock to 100 virtual PLCs (Programmable Logic Controllers) for security testing, performance benchmarking, and SCADA simulations.
Why Run 100 Virtual PLCs?
- ✅ Test IDS/IPS Performance – Can your intrusion detection system handle massive OT traffic without crashing?
- ✅ Simulate Attack Spreads – Test how your OT SIEM reacts to mass scans (e.g., `nmap` against 100 targets).
- ✅ Build Complex SCADA Setups – Run different PLC models/versions in a single lab.
- ✅ Measure Resource Usage – Conduct performance and stability tests under heavy loads.
Key Stats from the Demo
- 30MB RAM per PLC
- 4GB total RAM for 100 PLCs
- 0.3% CPU usage per PLC
You Should Know: How to Deploy & Test Labshock
1. Install Labshock (10-Minute Setup)
git clone https://github.com/zakharb/labshock.git cd labshock docker-compose up -d
2. Connect OpenPLCs & Configure SCADA
- Assign unique IPs to each PLC.
- Use FUXA SCADA for visualization.
- Deploy Modbus/TCP tags for realistic traffic.
3. Simulate Attacks & Test Detection
Run an Nmap scan against all PLCs:
nmap -Pn -p 502 --script modbus-discover 192.168.1.0/24
Check if your OT SIEM:
- Raises 1 incident (aggregated alerts).
- Raises 100 incidents (per device).
- Crashes due to DDoS-like traffic.
4. Performance Benchmarking
Monitor system resources:
htop Check CPU/RAM per PLC iftop Analyze network traffic
What Undercode Say
Labshock is a game-changer for ICS/OT security, enabling large-scale simulations without costly hardware. Key takeaways:
– Use Docker & lightweight VMs for efficient PLC deployment.
– Test SIEM resilience against mass scans and brute-force attacks.
– Leverage FUXA SCADA for realistic HMI interactions.
Expected Commands for Further Testing
Simulate Modbus brute-forcing python3 plcsploit.py --target 192.168.1.1-100 --port 502 Check for default credentials hydra -L users.txt -P passwords.txt modbus://192.168.1.1 Capture OT traffic for analysis tcpdump -i eth0 'port 502' -w modbus_traffic.pcap
Prediction
As OT/ICS attacks rise, tools like Labshock will become essential for red teams, defenders, and researchers. Expect more AI-driven anomaly detection integrations in future releases.
Expected Output:
✅ Labshock running 100 PLCs ✅ Nmap scans detected by SIEM ✅ FUXA SCADA dashboard operational
For more details, visit:
References:
Reported By: Zakharb Plc – Hackers Feeds
Extra Hub: Undercode MoN
Basic Verification: Pass ✅