Kill Chain Flashcards

1
Q

Who created the kill chain?

A

Lockheed Martin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the purpose of the kill chain?

A

It is a model for identification and prevention of cyber intrusions activity. The model identifies what the adversaries must complete in order to achieve their objective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the steps in the kill chain?

A
  1. Reconnaissance
  2. Weaponization
  3. Delivery
  4. Exploitation
  5. Installation
  6. Command & Control (C2)
  7. Actions on Objectives
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Reconnaissance

A

Harvesting information about the target (email addresses, employee information, software/hardware used, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Weaponization

A

Coupling exploit with backdoor into deliverable payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Delivery

A

Delivering weaponized bundle to the target via email, web, USB, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Exploitation

A

Exploiting a vulnerability to execute code on victim’s system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Installation

A

Installing malware on the asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Command & Control (C2)

A

Command channel for remote manipulation of victim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Actions on Objectives

A

With ‘Hands on Keyboard’ access, intruders accomplish their original goals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly