Cyber KC Flashcards

1
Q

The attackers passively or actively gather information, explore vulnerabilities

A

Reconnaissance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The attacker creates an attack vector, usually a weaponized payload. This may be customized to the target.

A

Weaponization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The payload is delivered to the target. Could be through email, malicious website, or infected files. The weaponized code has entered the target environment.

A

Delivery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The initial time the malicious code executes within the target system. Usually aims to escalate privileges within the system or network.

A

Exploitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Malware or another attack vector (e.g. a backdoor) is installed on the target system. System, config, registry files may be changed.

A

Installation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The attacker can now issue commands remotely and will often create more backdoors, make lateral movements to compromise more systems

A

Command & Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The attacker carries out their original intended goals e.g. Data Exfiltration, Data Destruction, Espionage

A

Actions on Objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly