Giter Site home page Giter Site logo

wizardy0ga / cyber-kill-chain Goto Github PK

View Code? Open in Web Editor NEW
2.0 1.0 1.0 10 KB

An overview of the Lockheed Martin Cyber Kill Chain, a framework that models the stages that an attacker may go through to achieve a successful cyber attack.

cyber-kill-chain cybersecurity lockheed-martin security blue-team

cyber-kill-chain's Introduction

The Cyber Kill Chain

Overview

The cyber kill chain is an intrusion model developed by Lockheed Martin in 2011, based on the kill chain military model, which displays the necessary stages for a successful attack. The cyber kill chain breaks down the seven stages that an attacker may go through to accomplish their intrusion objectives. As a defender, this model provides a framework for placing obstacles at each step of the attacker's cyber intrusion attempt. Incorporating the cyber kill chain into an organization's defense posture can provide a robust defense against attackers with TTP's that follow the stages of the kill chain. This model is not inclusive of all TTP's in use by attackers and should not be regarded as a monolithic structure for all attacks.

Reconnaissance

Recon is the first stage in the cyber kill chain model. During this stage, the attacker will enumerate their target either passively or actively with the goal of collecting as much information about the target organization as possible. In active recon, the attacker will make contact with their target through various methods such as port scanning internet facing devices or contacting the organization. In passive recon, the attacker makes no contact with the target and relies entirely on OSINT to collect information about their target. When the attacker feels that an actionable vulnerability has been found, they will move into the second phase of the kill chain.

Weaponization

This is the second phase of the kill chain. When the attacker has found an actionable vulnerability, their next goal will be coupling the vulnerability with an exploit that executes a piece of malware on the target host. This process is called weaponization and during this time, the attacker will be focused on engineering their malware into a deliverable payload that will evade known security mechanisms and perform the functions that the attacker seeks to execute on the target computer. More or less time will be spent researching, acquiring and configuring available malware or developing ones own malware depending on the needs and sophistication of the attacker. When the final payload is ready for delivery to the target, the attacker moves into the delivery phase.

Delivery

The delivery phase is the stage of an attack where the adversary attempts to pass their weaponized payload on to the target machine. Delivery of the payload depends on the TTP's of the adversary. Typically, the payload is delivered through phishing since the human is most vulnerable to exploitation. The payload may also be delivered through remote exploitation of vulnerable internet facing devices or through physical means such as keystroke injectors and other malicious physical media. Once the payload has been delivered to the target, the attack moves into the fourth phase of the kill chain.

Exploitation

The fourth phase of the kill chain is exploitation. During this phase, the attacker will now exploit the vulnerabilities discovered during reconnaissance, with the weaponized payload that has been delivered to the target host. The goal of exploitation is to gain an initial foothold into the network. Once the attacker has this foothold, they will proceed to enumerate the network's interior, searching for further vulnerabilities to exploit that are not reachable from the network perimeter. This often results in lateral movement and privilege escalation. When the attacker has assumed enough privilege within the network, they will move into the installation phase.

Installation

During the installation phase, the attacker will install a persistent backdoor to ensure that they remain inside the network. The attackers may also pack in other tools to aid accomplishing their objectives. When the attackers have finished the installation and configuration of their post exploitation tooling, they will move into the sixth phase of the kill chain, command and control.

Command and Control

In the command and control phase, the attacker will establish a connection between their newly installed implants and CnC servers. This connection allows the attackers to remotely control the infected machines via communications from the server over the command channel to the implant on the machine. It is through this communication channel that the attacker will move into the seventh and final stage of the attack, actions on objectives.

Actions on Objectives

This is the final phase of the cyberattack. The attacker will now have enough control over the network to accomplish their initial goals that motivated them to compromise the network. Utilizing the command and control communication channel between the attackers server and the implanted host machines, the attacker will be able to perform various actions such as data exfiltration, DDoS attacks, extortion or other malicious activities.

cyber-kill-chain's People

Contributors

wizardy0ga avatar

Stargazers

 avatar  avatar

Watchers

 avatar

Forkers

orhaniscan

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.