Week 2 Flashcards
What do you do during the reconnaissance phase of the cyber kill chain?
Identify and select target
What do you do during the weaponisation phase of the cyber kill chain?
Preparing the payload
What do you do during the delivery phase of the cyber kill chain?
Find a way to deliver the payload, ex phishing
What do you do during the exploitation phase of the cyber kill chain?
You trigger the payload; could be dependent on user action (clicking the link)
What do you do during the Installation phase of the cyber kill chain?
Installation of a backdoor/RAT
What do you do during the Command and Control (C2) phase of the cyber kill chain?
Establish infrastructure to enable C2 access to the compromised host
What do you do during the Actions on objectives phase of the cyber kill chain?
You have full access so you fulfill your original objectives (ransom, data exfiltration)
What kind of attacks are explained by the cyber kill chain?
Adversarial attacks
What is enumeration?
Active; about scanning the target to know more about its technical properties
What is the first step of pentesting?
Info gathering
What step is after enumeration in pentesting?
Exploitation
What is priv esc?
Privilege escalation is about expanding system access, either horizontal (same access, different account) or vertical (different access, different account)
What is the equivalent of step 7 (Actions on objectives) in the cyber kill chain in pentesting?
Post-exploitation
What is a critique of the cyber kill chain?
Inflexible
What are infection vectors?
Paths taken to infect victims