Cyber Kill Chain Flashcards
Cyber Kill Chain Step 1
Reconaissance
Cyber Kill Chain Step 2
Weaponization
Cyber Kill Chain Step 3
Delivery
Cyber Kill Chain Step 4
Exploitation
Cyber Kill Chain Step 5
Installation
Cyber Kill Chain Step 6
Command & Control (C2)
Cyber Kill Chain Step 7
Actions on Objectives
Reconaissance
Harvesting email addresses, conference information, etc.
Weaponization
Coupling exploit with backdoor into deliverable payload
Delivery
Delivering weaponized bundle to the victim via email, web, USB, etc.
Exploitation
Exploiting a vulnerability to execute code on victim’s system
Installation
Installing malware on the asset
Command & Control (C2)
Command channel for remote manipulation of victim
Actions on Objectives
With “Hands on Keyboard” access, intruders accomplish their original goals