Kill Chain Flashcards
Who created the kill chain?
Lockheed Martin
What is the purpose of the kill chain?
It is a model for identification and prevention of cyber intrusions activity. The model identifies what the adversaries must complete in order to achieve their objective.
What are the steps in the kill chain?
- Reconnaissance
- Weaponization
- Delivery
- Exploitation
- Installation
- Command & Control (C2)
- Actions on Objectives
Reconnaissance
Harvesting information about the target (email addresses, employee information, software/hardware used, etc.)
Weaponization
Coupling exploit with backdoor into deliverable payload
Delivery
Delivering weaponized bundle to the target via email, web, USB, etc.
Exploitation
Exploiting a vulnerability to execute code on victim’s system
Installation
Installing malware on the asset
Command & Control (C2)
Command channel for remote manipulation of victim
Actions on Objectives
With ‘Hands on Keyboard’ access, intruders accomplish their original goals