A ubuntu conteinerized script floods via local TCP requests a TwinCAT server hosted on the local network. The usage of a Wireshark or any package analyser is advised
This project is licensed under the MIT License.
Docker v20.10.12 curl v7.64.1 Linux ubuntu v20.04 GNU bash, v3.2.57 TwinCAT+TF2000 HMI Server Target environment (used: win10) Attacker environment (used: macOS BigSur)
The attack is using the instruction pipelining processing to execute parallelly the docker containers containing the evil file.