Cyber Kill Chain Methodology-
Cyber Kill Chain Methodology-
Weaponization:-
Preparing or creating a deliverable malicious payload by attacker using an exploit and a
backdoor.
Detect:
Threat Intelligence; Network Intrusion Detection System.
Deny:Network Intrusion Prevention System.
Delivery:-
via a The attacker delivers the weaponized malware phishing email or some other
medium. The most common delivery vectors for weaponized payloads include websites,
removable disks, and emails. This is the most important stage where the attack can be
stopped by the security teams.
Detect: Endpoint Malware Protection.
Installation:-
A backdoor or Remote Access Trojan is installed on the target system by the malware that
provides access to the intruder. This is also another important stage where the attack can be
stopped using systems such as HIPS (Host-based Intrusion Prevention System). Detect:
Security Information and Event Management (SIEM); Host-Based Intrusion Detection System
Deny:
Privilege Separation; Strong Passwords; Two-Factor Authentication, Router ACL, Firewall, Trust
Zone.
Actions on Objective:-
The attacker finally extracts the data from the system. The objective involves gathering,
encrypting, and extracting confidential information from the organization’s environment.
Endpoint Malware Protection, Incident Response, Data Loss Prevention; Security Information
and Event Management (SIEM).