Post

The Unified Kill Chain

The Unified Kill Chain

Overview of the attack phases

AttackPhaseDescription
1ReconnaissanceResearching, identifying and selecting targets using active or passive reconnaissance.
2WeaponizationPreparatory activities aimed at setting up the infrastructure required for the attack.
3DeliveryTechniques resulting in the transmission of a weaponized object to the targeted environment.
4Social EngineeringTechniques aimed at the manipulation of people to perform unsafe actions.
5ExploitationTechniques to exploit vulnerabilities in systems that may, amongst others, result in code execution.
6PersistenceAny access, action or change to a system that gives an attacker persistent presence on the system.
7Defense EvasionTechniques an attacker may specifically use for evading detection or avoiding other defenses.
8Command & ControlTechniques that allow attackers to communicate with controlled systems within a target network.
9PivotingTunneling traffic through a controlled system to other systems that are not directly accessible.
10DiscoveryTechniques that allow an attacker to gain knowledge about a system and its network environment.
11Privilege EscalationThe result of techniques that provide an attacker with higher permissions on a system or network.
12ExecutionTechniques that result in execution of attacker-controlled code on a local or remote system.
13Credential AccessTechniques resulting in the access of, or control over, system, service, or domain credentials.
14Lateral MovementTechniques that enable an adversary to horizontally access and control other remote systems.
15CollectionTechniques used to identify and gather data from a target network prior to exfiltration.
16ExfiltrationTechniques that result or aid in an attacker removing data from a target network.
17ImpactTechniques aimed at manipulating, interrupting, or destroying the target system or data.
18ObjectivesSocio-technical objectives of an attack that are intended to achieve a strategic goal.

The First Phase - In

Cyber Kill Chain In

The Second Phase - Through

Cyber Kill Chain Through

The Third Phase - Out

Cyber Kill Chain Out

References

unifiedkillchain.com: The-Unified-Kill-Chain.pdf

This post is licensed under CC BY 4.0 by the author.