Cyber KC Flashcards
The attackers passively or actively gather information, explore vulnerabilities
Reconnaissance
The attacker creates an attack vector, usually a weaponized payload. This may be customized to the target.
Weaponization
The payload is delivered to the target. Could be through email, malicious website, or infected files. The weaponized code has entered the target environment.
Delivery
The initial time the malicious code executes within the target system. Usually aims to escalate privileges within the system or network.
Exploitation
Malware or another attack vector (e.g. a backdoor) is installed on the target system. System, config, registry files may be changed.
Installation
The attacker can now issue commands remotely and will often create more backdoors, make lateral movements to compromise more systems
Command & Control
The attacker carries out their original intended goals e.g. Data Exfiltration, Data Destruction, Espionage
Actions on Objectives