Stage One – Reconnaissance

(39 views)

The Cyber Kill Chain: An Overview The Cyber Kill Chain framework was developed by Lockheed Martin to describe the typical stages of a cyber attack. It outlines the steps an attacker takes to compromise a target, from initial reconnaissance to final data exfiltration or system disruption. (1) Here’s a handy image: (image source : https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html) The seven stages of the Cyber Kill Chain are: Reconnaissance - The attacker gathers information about the target to identify vulnerabilities. Weaponization - The attacker creates malware or an exploit to be used in the attack. Delivery - The attacker delivers the malware or exploit to the target, often through methods like phishing. Exploitation - The attacker exploits a vulnerability to gain access to the target system. Installation - The attacker installs malware on the compromised system to maintain access. Command and Control - The attacker establishes control over the compromised system. Actions on Objectives -....

April 29, 2024
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.
What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4

Name(Required)

We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.