49 - The Cyber Kill Chain

The structure and plan of a cyber-attack based on a threat chain, term borrowed from military concepts.

Attack Steps

Reconnaisance

Weaponization

Delivery

Exploitation

Installation

Post-Exploitation:

Command and Control (C2)

Actions on Objective