logo
Red tradecraft
Operational procedures for OT attacks
  • Privacy greenhouse
  • Defence blues
  • Purple crossroads
  • Indigo observatory
  • Contact
Initializing search
    • In: Where the falcons and foxes roam
      • A canopy of apple-blossom
      • Social engineering
      • Where wild boars plough through endpoints
      • Wolverines do not ask for permissions
      • Riches in the ground
      • The device is just the keyring
      • Poking physics with network packets
        • Field notes from the process layer
        • Operational procedures for OT attacks
          • Runbook: OT reconnaissance
          • Runbook: IT to OT pivot
          • Runbook: Industrial protocol abuse
          • Runbook: Engineering workstation compromise
          • Runbook: IT-to-OT compromise chain
        • Operational procedures for OT attacks
          • Runbook: OT reconnaissance
          • Runbook: IT to OT pivot
          • Runbook: Industrial protocol abuse
          • Runbook: Engineering workstation compromise
          • Runbook: IT-to-OT compromise chain
    • Through: Where the raccoons burrow and rummage
    • Out: Where squirrels swipe the crown jewels
    • Unseen University Power & Light Co.
    • The Scarlet Semaphore
    • Myrddin’s menagerie

    Operational procedures for OT attacks¶

    Runbooks:

    • Runbook: OT reconnaissance
    • Runbook: IT to OT pivot
    • Runbook: Industrial protocol abuse
    • Runbook: Engineering workstation compromise
    • Runbook: IT-to-OT compromise chain
    2026-04-01 10:32
    © Copyright 2025, TyMyrddin.
    Created using Sphinx 7.2.6. and Sphinx-Immaterial

    Made with love in the Unseen University, 2025, with a forest garden fostered by /ut7