Red wilds
Attack chain playbooks for OT operations
Privacy greenhouse
Defence blues
Purple crossroads
Indigo observatory
Contact
Initializing search
Red wilds
Whatever, you watch your step.
Whatever, you watch your step.
Unseen University Power & Light Co.
The Scarlet Semaphore
Myrddin’s menagerie
Creating all kinds of labs
In:
In:
Where the falcons and foxes roam
Where the falcons and foxes roam
A canopy of apple-
blossom
Social engineering
Where wild boars plough through endpoints
Wolverines do not ask for permissions
Riches in the ground
The device is just the keyring
Poking physics with network packets
Poking physics with network packets
Field notes from the process layer
Operational procedures for OT attacks
Attack chain playbooks for OT operations
Attack chain playbooks for OT operations
Playbook:
IT-
to-
OT compromise chain
Attack chain playbooks for OT operations
Attack chain playbooks for OT operations
Table of contents
Playbook:
IT-
to-
OT compromise chain
Controls and detection for OT attacks
Through:
Through:
Where the raccoons burrow and rummage
Out:
Out:
Where squirrels swipe the crown jewels
Attack chain playbooks for OT operations
¶
Playbooks:
Playbook: IT-to-OT compromise chain
Back to top