Threat Models Pt.2 (Cyber Kill Chain) Flashcards
A ______ _______ is a systematic process to target and engage an adversary to create desired effects.
Kill chain
Enables analysis to detect and mitigate intrusions.
Cyber Kill Chain
Research, identification, and selection of targets, often represented as crawling internet websites such as conferences proceedings and mailing lists for email addresses, social relationships, or information on specific technologies.
Reconnaissance
Coupling a payload with an exploit into a deliverable.
Weaponization
Transmission of the weapon to the targeted environment.
Delivery
After the weapon is delivered to the victim host, ___________ triggers the intruders’ code
Exploitation
Installation of malware on the victim system allows the adversary to maintain persistence inside the environment.
Installation
Typically, compromised hosts must beacon outbound to an internet controller server to establish a C2 channel.
Command and Control
Only now, after progressing through the first six phases, can intruders take actions to achieve their original objectives.
Actions on Objectives