Attack Frameworks Flashcards
Kill Chain Stages
Reconnaissance Weaponization Delivery Exploitation Installation Command & Control (C2) Action on Objectives
The attacker determines what methods to use to complete the phases of attack.
Reconnaissance
The attacker adds payload code that will enable access with exploit code that will use a vulnerability to execute on the target system.
Weaponization
The attacker identifies a vector by which to transmit the weaponized code to the target environment.
Delivery
The weaponized code is executed on the target system by this mechanism.
Exploitation
This mechanism enables the weaponized code to run a remote access tool and achieve persistence on the target system.
Installation
The weaponized code establishes an outbound channel to a remote server that can then be used to control the remote access tool and possible download additional tools to progress the attack.
Command & Control (C2)
The attacker typically uses the access he has achieved to covertly collect information from target systems and transfer it to a remote system (data exfiltration) or achieve other goals and motives.
Actions on Objectives
A knowledge base maintained by the MITRE Corporation for listing and explaining specific adversary tactics, techniques, and common knowledge or procedures (attack.mitre.org)
The pre-ATT&CK tactics matrix aligns to the reconnaissance and weaponization
phases of the kill chain
MITRE ATT&CK Framework
A framework for analyzing cybersecurity incidents and intrusions by exploring the relationships between four core features: adversary, capability, infrastructure and victim.
Diamond Model in Intrusion Analysis