Meanings Flashcards
Black hats
They are engaged in potentially illegal activities, such as attacking computer systems for malicious purposes
White hat
People who always do their work for good
Grey hat
They are working for good but they are using the technology of blackhat hackers
Reconnaissance
Research, identification and selection of targets
Weaponization
Pairing remote access malware with exploit into a deliverable payload (e.g., Adobe PDF and Microsoft Office files).
Delivery
(As in Intrusion Kill Chain)
Transmission of weapon to target (e.g., via email attachments, websites or USB drives)
Exploitation
(As in Intrusion Kill Chain)
Once delivered, the weapon’s code is triggered, exploiting vulnerable applications or systems.
Installation
(As in Intrusion Kill Chain)
The weapon installs a backdoor on a target’s system, allowing persistent access
Command & Control
(As in Intrusion Kill Chain)
Outside server communication with the weapons providing “hands-on keyboard access” inside the target’s network
Actions on objective
(As in Intrusion Kill Chain)
The attacker works to achieve the objective of the intrusion, which can include exfiltration or destruction of data, or intrusion of another target.