Incident Response Tips

Practical Steps for High Quality Threat Hunting on iOS Without a Jailbreak

One of our customers operates a large OT-IT network. As part of Threat Hunting operations on their environment, we will investigate their work phones to ensure every asset is safe from malicious activity. We want to share with you practical steps for Threat Hunting on iOS Devices.

Read More

Incident Response Tips

The Practical Way to Detect Golden and Silver Ticket Attacks

In this short post, we describe the most practical detection methods of the popular Golden and Silver Ticket attacks in the Active Directory environment. 

Read More

Incident Response Tips

A Glimpse Into Our Incident Response OT Training

We want to share with you one of the IR exercises in our training. This training combines practical OT and IT attacks and we are sure you can learn some new concepts and ideas.

Read More

Incident Response Tips

Linux Memory Forensics Part 2 - Detection Of Malicious Artifacts

In this post, we describe detection methods of malicious artifacts on Linux memory dump using the tool Volatility.

Read More

Incident Response Tips

Linux Memory Forensics Part 1 - Memory Acquisition

In this post we demonstrate the memory acquisition process.

Read More
loader
×

OTORIO website uses cookies. By continuing to browse the site you are agreeing to our use of cookies. For more details about cookies and how to manage them, see our cookie policy.

Continue