Understanding the Attackers and Their Methods Flashcards
Ethical Hacking: Understanding Ethical Hacking - Module 3
Cyber Kill Chain Methodology
A framework to secure cyberspace.
Reconnaissance
Weaponization
Delivery
Exploitation
Installation
Command & Control
Action on Objectives
Reconnaissance
Where the attacker gathers as much information they can about the intended victim.
eg. network info, system info
Weaponization
Analyze the gathered information and identify vunlerabilities.
Delivery
Deliver the payload.
Exploitation
Step where the initial breach occurs, allowing the attacker to execute malicious exploit.
eg. break into system / gain unauthorized control
Installation
Concerned with establishing a persistent presence in the system. Aims to maintain and reinforce control over time.
Command & Control
Create a two way channel between the hacking system to the target system.
Action on Objectives
Where the attackger goes through and steals confidential data.
MITRE | ATT&CK
Designed to document common tactics, techniques, and procedures that advanced persistent threats use against Windows
MITRE | Tactic
The adversary’s strategic goal.
MITRE | Techniques
The action an adversary takes.
MITRE | Procedures
Carries out techniques or sub-techniques.