Please enable JavaScript.
Coggle requires JavaScript to display documents.
reverse engineering (Governance (Reversing and Interoperability, Ground…
reverse engineering
Governance
Reversing and Interoperability
Ground Rules
Locations
Safety and Hazards
Work Permits and disruption
MOC
Current and missing Documentation
Putting the Pieces together
Hardware
Computer
Transmitter
Network
Storage
PLC/RTU/Contoller
Media Converters/MUX
Fibre and Ethernet
Security
Application
Hardware
Digital Rights
Auditing
Cryptogrpohy
Passwords and Lost passwords
Tools
System Monitoring Tools
Sniffers
Windows Event
SIEM
AntiVirus
TACACK+
Disassemblers
DeBuggers
Patch Management
Approches
Offline
Live
Dumping tools
Low Level Applications
Application Types
ICS Vendor Specific
IT
Office
Governmental
Regulitory
Virtual Machines
High Level Prespective
Application Structre
Moduels
Application Dependancies
Data Management
Data Flows
Users
Passwords
Communication
Protocols
Ports
Languages
.Net
Modbus
Java
Other
Operating Systems
Windows
Architecture
Domain
Workgroup
Components
Supported Hardware
Group Policies
Users and Computers
Roles and Responsibilities
Folder Structure
Permissions
Memory Management
Virtual Memory
Working sets
Objects
Processes and Threads
Services
Linux
Vendor Propriorty
Virtualisation
VMware
Hyper V
Applications
Citrix
RDP/Windows
Applications
Interoperability with Proprietary software
Competing Software
Evaluation of software Quality and Robustness
The Reversing Process
System-Level
Code-Level