Room Link:
https://tryhackme.com/room/ICS-modbus-aoc2025-g3m6n9b1v4
Official walkthrough for quick onboarding:
🔗 YouTube Link:
https://youtu.be/-RyO0yn3pZ8
Day 19 of Advent of Cyber 2025 focuses on Industrial Control Systems (ICS) and Operational Technology (OT) security.
The scenario simulates a compromised PLC-controlled drone delivery system responsible for shipping Christmas presents.
Although system dashboards report everything as operational, customers receive chocolate eggs instead of Christmas gifts.
This discrepancy indicates a logic-level attack, not a hardware failure.
The attacker exploited Modbus TCP, a legacy industrial protocol, to directly manipulate PLC registers and coils.
An Nmap scan of the target system revealed the following exposed services:
Modbus TCP is particularly dangerous because it provides:
Any user with network access can directly read or write PLC values.
Accessing the web interface on port 80 revealed a live CCTV feed showing:
This confirmed the issue was caused by malicious logic manipulation.
The PLC communicates using standard Modbus data structures:
HR0 — Package Type Selection
0 = Christmas Gifts1 = Chocolate Eggs2 = Easter BasketsHR1 — Delivery Zone
1–9 = Normal Zones10 = Ocean Dump ZoneHR4 — System Signature
HR0 = 1 → Chocolate Eggs forced HR1 = 5 → Normal delivery zone HR4 = 666 → Eggsploit signature detected
C10 = False → Inventory verification disabled C11 = True → Protection mechanism ENABLED C12 = False → Emergency dump inactive C13 = False → Audit logging disabled C15 = False → Self-destruct not yet armed
The presence of 666 confirms the use of the Eggsploit framework.
The attacker implemented a booby-trap using PLC logic.
If HR0 is modified while C11 = True:
This mirrors how real-world ICS safety mechanisms can be weaponized.
The restoration must follow a strict order.
C11 = False
HR0 = 0
C10 = True
C13 = True
C12 = False → No emergency dump C15 = False → Self-destruct never armed C14 = True → Christmas restored
502
1
666
C11
THM{eGgMas0V3r}
Day 19 provides a realistic and educational ICS incident response scenario.
It demonstrates how legacy industrial protocols can be abused and why defenders must fully understand system logic before making changes.
Christmas was saved — not by brute force, but by careful, informed remediation.
✅ Challenge Completed Successfully