Cyber Kill Chain
Steps for attack
Reconnaissance
Weaponization
2) Weaponization:- In this weaponization there are 2 steps 1)exploit 2)payload
Exploit:-Entering into the system through backdoor.
Payload:-After entering into the system what are the things to be done it will assign.
Delivery
3) Delivery:- Delivering weaponized bundle to the victim via email, web, USB etc.
Exploitation
4) Exploitation:- Exploiting a vulnerability to excute code on victim's system.
Installation
5) Installation:- Installing malware on the asset and gaining access of the victim's system.
Command & Control (C2)
6) Command & Control (C2):- After installing the malware on the victim's system take the command channel for remote manipulation of victim.
Action On Objectives
7) Action On Objectives:- With 'hands on keyboard' access, intruders accomplish their original goals.
Post a Comment
0 Comments