Skip to Content

Achilles tested. Achilles certified.




The Achilles Test Platform (ATP) is a specialized testing framework designed to enhance the security and durability of industrial automation and control systems. By simulating various operational challenges and cyber threats, ATP helps detect vulnerabilities, improve system resilience, and ensure compliance with industry regulations. It enables manufacturers and operators to proactively safeguard their infrastructure against potential risks, ensuring long-term reliability and performance.  Achilles has the most extensive set of control protocol coverage, with tests designed specifically for devices found in critical infrastructure. The monitoring techniques also provide unparalleled visibility into your device's core functionality, enabling real-time analysis of data flow, network communication, and system responses. It continuously tracks all key operating parameters, including latency, packet integrity, protocol compliance, and fault tolerance during testing.





The Achilles Test Platform (ATP) is a specialized testing framework designed to enhance the security and durability of industrial automation and control systems. By simulating various operational challenges and cyber threats, ATP helps detect vulnerabilities, improve system resilience, and ensure compliance with industry regulations. It enables manufacturers and operators to proactively safeguard their infrastructure against potential risks, ensuring long-term reliability and performance.  Achilles has the most extensive set of control protocol coverage, with tests designed specifically for devices found in critical infrastructure. The monitoring techniques also provide unparalleled visibility into your device's core functionality, enabling real-time analysis of data flow, network communication, and system responses. It continuously tracks all key operating parameters, including latency, packet integrity, protocol compliance, and fault tolerance during testing.

Real-world test environment monitoring

The patented test framework is specifically designed to allow you to test and monitor your device's capability under real-world conditions— allowing you to accurately verify and validate performance. The monitoring techniques also provide unparalleled visibility into your device's core functionality and monitor all key operating parameters during testing.  

The monitoring techniques also provide unparalleled visibility into your device's core functionality, enabling real-time analysis of data flow, network communication, and system responses. It continuously tracks all key operating parameters, including latency, packet integrity, protocol compliance, and fault tolerance durng testing.

Comprehensive testing of industrial control specific protocols

Achilles has the most extensive set of control protocol

coverage, with tests designed specifically for devices found in critical infrastructure. Our experience with manufacturers and operators has allowed for tests that specifically address real-life scenarios in the field. The platform supports a wide range of industrial communication protocols, including Modbus, DNP3, IEC 61850, OPC UA, PROFINET, Ethernet/IP, and many others. These tests help identify vulnerabilities in protocol implementations, ensuring that devices can withstand cyber threats, unexpected network conditions, and operational stress without compromising performance.

Comprehensive testing of industrial control specific protocols

Achilles has the most extensive set of control protocol

coverage, with tests designed specifically for devices found in critical infrastructure. Our experience with manufacturers and operators has allowed for tests that specifically address real-life scenarios in the field. The platform supports a wide range of industrial communication protocols, including Modbus, DNP3, IEC 61850, OPC UA, PROFINET, Ethernet/IP, and many others. These tests help identify vulnerabilities in protocol implementations, ensuring that devices can withstand cyber threats, unexpected network conditions, and operational stress without compromising performance.


Fast, efficient, and easy automated testing methodology

Achilles manages the sending and monitoring of multiple tests and test sequences, resulting in the fast execution of a comprehensive suite of tests. It can complete a full set of tests for Achilles Communications Certification Level 1 in  just 2 hours.

Fast, efficient, and easy automated testing methodology

Achilles manages the sending and monitoring of multiple tests and test sequences, resulting in the fast execution of a comprehensive suite of tests. It can complete a full set of tests for Achilles Communications Certification Level 1 in  just 2 hours.


Extensive summary and detailed reporting

Detailed fault reporting allows you to identify and drill down on specific faults as well as easily share information across your organization. Through packet capture and reports, you can quickly reproduce faults and export regression test suite for other platform users to utilize. These reports can be exported into cxv, xml, and pdf files.


Use Cases

Automated QA Testing

The cost of correcting a vulnerability in the field is 65 times greater than if it is found and corrected during development. 

Prepared products for certification

Test products in advance to ensure they will conform with industry recognized standards and certifications.

Communication Robustness Testing

Tests Communication robustness for industrial and automation devices,ensuring reliable data exchange under varying network conditions

Vulnerability Discovery Remediation 

With extensive experience and deep industry knowledge, we provide insights and solutions that keep you ahead of the curve and other trends as well

Performance Availability Validation 

Validates performance and availability based on specifications, ensuring consistent operation under different load conditions.  

Fault Reproduction & Identification 

Allows faults to be reproduced, isolated, and identified, enabling quicker troubleshooting and system reliability improvements.

Test Summary                        

Port Scanning is one of the first steps an attacker uses to gather information about a system to exploit it and ensuring consistent operation under different load conditions.

Storms: The ability of a device to handle packets varies with packet rate, Achilles can run this test with varying rate limits to determine the maximum value the device under test can handle.


Fuzzers: Fuzzers use random number generation to send invalid packets to test the behavior of the device under test.

Similar to known vulnerabilities, the grammars generate fuzzed versions of a known vulnerability, or traffic that almost triggers the vulnerability

Similar to known vulnerabilities, the grammars generate fuzzed versions of a known vulnerability, or traffic that almost triggers the vulnerability

Damaged packets are sent with small variations in packets such as mismatch in field length.


Protocol Summary

Protocols

Expanded

Stack

Ethernet

Ethernet

TCP/IP

ARP

Address Resolution

TCP/IP

LLDP

Link Layer Discovery

TCP/IP

IP V4

Internet Version 4

TCP/IP

ICMP

Internet Control message

TCP/IP

IGMP

Internet Group Message

TCP/IP

TCP

Transmission Control Protocol


TCP/IP

UDP

User Datagram Protocol

TCP/IP

FTP

File Transfer Protocol


IT Protocol

HTTP

Hyper text transfer Protocol

IT Protocol

NTP

Network Time Protocol

IT Protocol

RDP

Remote Desktop Protocol

IT Protocol

RPC

Remote Procedure Call

IT Protocol

Telnet

Telnet

IT Protocol

DNP3

Distributed Network Protocol

Control Protocol

Ethernet/IP

Ethernet Industrial Protocol

Control Protocol

GOOSE

Generic Object-Oriented

Control Protocol 


MMS

Manufacturing Message Specification


Control Protocol

PROFINET

Process Field Network

Control Protocol

ARINC

Aeronautical Ratio Incorporated

Aviation Protocol

Zigbee

Zigbee Wireless Mesh

Wireless Protocol

SES-92

Serial Protocol

Serial Protocol


Protocol Summary


Ethernet

Ethernet

      TCP/IP

ARP

Address Resolution 

      TCP/IP

LLDP

Link Layer Protocol

      TCP/IP

IP V4

Internet Protocol 4 

      TCP/IP

ICMP

Internet Control Message 

      TCP/IP

IGMP

Internet Group Message

      TCP/IP

TCP

Transmission Control Protocol

      TCP/IP

UDP

User Datagram Protocol 

      TCP/IP

HTTP                 Hyper Text Transfer                IT Protocol   

                

NTP                   Network Time Protocol           IT Protocol


RPC                   Remote Procedure Call           IT Protocol


RDP                  Remote Desktop Protocol       IT Protocol


Telnet               Telnet                                         IT Protocol


E/IP                   Industrial Protocol                  Control Protocol   


GOOSE             Generic Object-Oriented       Control Protocol


IEC104              Internet Commission             Control Protocol


MMS                 Manufacturing                        Control Protocol 


OPC/UA           Open Communication           Control Protocol 


PROFINET        Process  Network                   Control Protocol 


Zigbee               Wireless Mesh                        Wireless Protocol   


SES-92               Serial Protocol                        Serial    Protocol




Test Summary                        


Port Scanning is one of the first steps an attacker uses to gather information about a system to exploit it and ensuring consistent operation under different load conditions.

Storms: The ability of a device to handle packets varies with packet rate, Achilles can run this test with varying rate limits to determine the maximum value the device under test can handle.


Fuzzers: Fuzzers use random number generation to send invalid packets to test the behavior of the device under test.

Similar to known vulnerabilities, the grammars generate fuzzed versions of a known vulnerability, or traffic that almost triggers the vulnerability

Similar to known vulnerabilities, the grammars generate fuzzed versions of a known vulnerability, or traffic that almost triggers the vulnerability

Damaged packets are sent with small variations in packets such as mismatch in field length.


Protocol Summary


Protocol Summary


Ethernet

Ethernet

      TCP/IP

ARP

Address Resolution 

      TCP/IP

LLDP

Link Layer Protocol

      TCP/IP

IP V4

Internet Protocol 4 

      TCP/IP

ICMP

Internet Control Message 

      TCP/IP

IGMP

Internet Group Message

      TCP/IP

TCP

Transmission Control Protocol

      TCP/IP

UDP

User Datagram Protocol 

      TCP/IP

HTTP                 Hyper Text Transfer                IT Protocol   

                

NTP                   Network Time Protocol           IT Protocol


RPC                   Remote Procedure Call           IT Protocol


RDP                   Remote Desktop Protocol       IT Protocol


Telnet               Telnet                                         IT Protocol


E/IP                   Industrial Protocol                  Control Protocol   


GOOSE             Generic Object-Oriented       Control Protocol


IEC104              Internet Commission             Control Protocol


MMS                 Manufacturing                        Control Protocol 


OPC/UA           Open Communication           Control Protocol 


PROFINET        Process  Network                   Control Protocol 


Zigbee               Wireless Mesh                        Wireless Protocol   


SES-92               Serial Protocol                        Serial    Protocol