Cybersecurity Kill Chain
Last updated
Was this helpful?
Last updated
Was this helpful?
Derived from military kill chain
describes the structure of an attack
7 phases or stages of a targetted attack
Break the kill chain is the defense
Each stage present opportunity to detect and react
Gather information on the target before the actual attack starts
Looking for publicly available information on the internet
also known as Footprinting
Whois : checking the public database
whois google.com
Nslookup: querying the DNS
Cencys
Shodan
Social Media
Dumpster Diving
Interaction with the target
Technical
Vulnerabilities scanning
Fingerprinting: nmap
Web Application Scanning
Non Technical
Physical Interaction
Social Media
Passive this step happens at the attacker side, without contact with the victim.
The attacker uses an exploit and creates a malicious payload to send to the victim
Examples:
The attacker sends the malicious payload to the victim
Open Services (e.g. FTP)
Social Engineering (e.g. EMAIL)
Physical (USB)
Exploitation weaknesses in your security
Execute their scripted code (weapon from step 2) onto the victim environment.
Now comfortably beyond your security systems
Malicious file can begin installing malware onto your environment
Example: install Netcat
The attacker creates a command and control channel
RAT, Remote server
IRC protocol
Twitter account
Continue to operate his internal assets remotely.
The attacker performs the steps to achieve his actual goals inside the victim's network
Takes months, and thousands of small steps, in order to achieve
Payment histories, login data, account information, or other sensitive data. They could freeze your data and ransom it back to you.
Defense action
Detect
Deny
Disrupt
Degrade
Deceive
Contain
Defense action Matrix
Detect
Deny
Uniting and extending Lockheed Martin's Kill Chain and MITRE's Att&CK framework
18 Attack Phases
https://www.lockheedmartin.com/content/dam/lockheed-martin/rms/documents/cyber/LM-WhitePap er-Intel-Driven-Defense.pdf
Unicorn (Python tool)
Metasploit
Social Engineering Toolkit
Meterpreter
Netcat