This software and hardware configuration is provided strictly for authorized security auditing, academic research, and defensive engineering. The author assumes no liability for misuse, unauthorized ...
The essence is to create a program that will poll the device via the Modbus TCP protocol and, based on the received data (coordinates and time), build graphs of the dependence of coordinates and speed ...