Watch this video on YouTube
What specific command in the Modbus TCP protocol would an attacker typically use to alter the flow of data to a critical infrastructure system?