1-What Is The Cyber Kill Chain?
1-What Is The Cyber Kill Chain?
The cyber kill chain is essentially a cybersecurity model created by Lockheed Martin that
traces the stages of a cyber-attack, identifies vulnerabilities, and helps security teams to stop
the attacks at every stage of the chain.
The kill chain model describes an attack by an external attacker attempting to gain access
to data or assets inside the security perimeter. The attacker performs reconnaissance,
intrusion of the security perimeter, exploitation of vulnerabilities, gaining and escalating
privileges, lateral movement to gain access to more valuable targets, and finally attempts
to obfuscate their activity.
The kill chain model mainly describes an advanced persistent threat (APT), a sophisticated
attacker waging an organized attack campaign against a specific company.
• PowerShell
• Scripting
• Path interception
• Sudo attack
• Process injection
Example attacks in the lateral movement stage:
• SSH hijacking
• Shared webroot
• Binary padding
• Code signing
• File deletion
• Hidden users
• Process hollowing
• Resource hijacking
• Service stop
• System shutdown
• Data compressed
• Data encrypted
• Scheduled transfer
3- what is the Security controls that you can use to stop the kill chain in all stage:
• Reconnaissance
• Weaponization
• Delivery
Degrade: Queuing
Contain: Router Access Control Lists; App-aware Firewall; Trust Zones; Inter-zone
Network Intrusion Detection System
• Explotation
• Installation
Degrade: Tarpit
• Actions on Objectives
Deceive: Honeypot