1️⃣ Reconnaissance
🔹 The attacker acquires information about the target, including vulnerabilities, entry points, and third-party connections.
🔹 Security measures such as encryption, authentication, firewall, and anti-virus can aid in preventing or limiting reconnaissance.
2️⃣ Weaponization
🔹 The attacker crafts or modifies a malicious tool (e.g., malware) to exploit the vulnerabilities of the target.
🔹 Detection or blocking of weaponization can be achieved through tools like sandboxing, signature-based detection, and behavior-based detection.
3️⃣ Delivery
🔹 The attacker transmits or delivers the weaponized tool to the target's network or system through channels such as email, web, or USB.
🔹 Prevention or interception of delivery is possible with tools such as spam filters, web proxies, and device control.
4️⃣ Exploitation
🔹 The attacker activates the weaponized tool, exploiting the target's vulnerabilities and gaining access to the network or system.
🔹 Stopping or mitigating exploitation can be achieved using tools like patch management, vulnerability scanning, and intrusion prevention.
5️⃣ Installation
🔹 The attacker installs additional tools or malware on the target's network or system to maintain or extend access and control.
🔹 Removal or isolation of installation is possible through tools such as malware removal, system restoration, and network segmentation.
6️⃣ Command and Control (C2)
🔹 The attacker establishes a communication channel with the installed tools or malware to remotely control and direct the attack.
🔹 Disruption or blocking of C2 is attainable using tools such as network analysis, traffic filtering, and domain blacklisting.
7️⃣ Actions on Objectives
🔹 The attacker achieves their ultimate goal, such as stealing data, disrupting operations, or destroying assets.
🔹 Recovery or protection of actions on objectives is possible through tools such as backup, encryption, and incident response.
🟩 Conclusion
The Cyber Kill Chain serves as an invaluable framework for comprehending and analyzing the stages of a cyberattack, providing insights into the measures that can be implemented to prevent or intercept each step.