The chain consists of seven phases:

Description of your first forum.
Post Reply
sujonkumar6300
Posts: 316
Joined: Thu Jan 16, 2025 8:32 am

The chain consists of seven phases:

Post by sujonkumar6300 »

Reconnaissance: Research, identification and selection of targets. Much of this can be done through public sources.

Weaponization: After identifying a potential vulnerability, the attacker builds (or acquires) well-chosen malware that can exploit the vulnerability.

Delivery: Sending the malware to the victim (for example, as an email afghanistan consumer email list attachment).

Exploitation: Execute the malicious code that was sent to the victim.

Installation: Installing malicious code on the victim's system so that the attacker can retain access.

Command and Control (C2): When the malicious code is installed, it has to inform the attacker that it was successful and wait for instructions.

Actions on objectives: This is the final objective that the attacker wanted to achieve, for example, stealing information.

Defense measures
So what defense mechanism can be taken to avoid these attackers?

In this model, the crucial point is that breaking any step breaks the entire kill chain, meaning that attackers have to go through the entire model again to succeed.
Post Reply