The Silent Anvil — operational note¶
(Department of Silent Stability — internal, strictly not for the gullible)
Preface¶
By direction of the Patrician (who maintains an abiding dislike of surprises, and a tendency to have an opinion on everything), this note records the twin undertakings of the Department’s latest enterprise, informally known as the Silent Anvil.
The Anvil has two arms: the Obsidian Desk, where firmware is interrogated with the delicacy of a tax inspector opening a dusty ledger, and the Fingerprint Forge, where the results of that interrogation are turned into passive, non‑intrusive identification tools.
No trumpets. No explosions. No device is poked without consent.
Obsidian Desk¶
The Obsidian Desk handles offline artefacts for industrial and consumer devices, including but not limited to:
PLCs, RTUs, HMIs, gateways, sensors
Smart home hubs, IoT appliances, and embedded consumer electronics
Companion mobile apps, software bundles, and update packages
Tasks performed:
Vulnerability research
Systematic static analysis of firmware
Identification of flaws, misconfigurations, unsafe defaults
Reconstruction of device logic where relevant
Logging unsafe instructions, registers, or sequences
Artefact extraction and fingerprinting
Banner strings, protocol constants, error messages
Web UI assets, headers, embedded frameworks
Hardcoded credentials, default configurations, API paths
TLS certificates, serial numbers, cryptographic fingerprints
Principle: the Desk researches the bad in a controlled environment; nothing touches the internet, nothing changes the device state, nothing explodes without a fire extinguisher at hand.
Fingerprint Forge¶
Once the Desk has documented the vulnerabilities and derived artefacts, the Forge takes over:
Input: canonical firmware fingerprints, static identifiers, version mappings
Function: detect where the vulnerable firmware is deployed across the internet, without interacting with it
Scope: industrial devices and internet‑exposed smart devices
Detection techniques:
Search engines and passive datasets
TLS, HTTP, MQTT, SSDP, UPnP fingerprints
Web asset hashes, static resources, headers, banners
Certificate subjects, serials, and quirks
Behavioural probing? Only in the lab. The Forge avoids poking live devices like a polite thief at a doorbell.
Notification paths:
Industrial systems → operators, vendors, CERTs, regulators
Smart home devices → vendors, ISPs, consumer CERTs, coordinated remediation teams
The Forge never contacts end users directly. Quiet observation, not accusation, is the modus operandi.
Division of labour¶
Obsidian Desk discovers what is wrong, safely and fully.
Fingerprint Forge discovers where it is, quietly and at scale.
This ensures:
No live devices are compromised unnecessarily
Vulnerabilities are understood before detection attempts
Identification is safe, reproducible, and responsible
Operating principles¶
All research is offline and controlled.
Fingerprints are derived from static artefacts only.
Unsafe or uncertain artefacts are flagged, not deployed.
Behavioural probing occurs only in the lab, never at internet scale.
Notifications are always responsible and quiet.
The Patrician’s patience is finite; waste it not.
End of operational note — by memorandum from the Head of the Department of Silent Stability, initialled in a handwriting that strongly suggests the Patrician has already read it.