Skip to content

KINGSANIT CYBERPEDIA

Menu
  • Cyber Security
    • Cyber Security Fundamentals
      • Security Principles
      • Information Security
    • Hacking
      • Reconnaissance
        • Footprinting
        • Scanning
        • Enumeration
        • Vulnerability Analysis
      • Privilege Escalation
      • Ethical Hacking
    • Governance, Risk And Compliance (GRC)
      • Risk Management
    • Security Architecture And Engineering
      • Cryptography
      • Identity Access Management
    • Security Operations
      • Security Assessment
        • Vulnerability Management
          • Threat Intelligence
      • Intrusion Detection And Prevention
    • Cyber Security Attacks and Threats
      • DoS
      • Password Hacking
      • Web Attacks
      • Web Applications Attacks
      • WI-FI Wireless Attacks
      • Bluetooth Attacks
  • Computer Networks And Internet
    • LAN Switching
    • Networking Protocols
    • Internet
  • Information Technology
    • Database
    • Web
  • Computer Architecture And Organization
  • Operating Systems
    • Programming
Menu

Cyber Kill Chain

Posted on by

The Cyber Kill Chain framework developed by Lockheed Martin explains attacker’s progressive steps when attacking a target which can be used to identify and prevent cyber threat.

The Cyber Kill Chain has seven stages as following:

Reconnaissance

This is the initial phase, where the attacker gather’s information about the target. Scanning, Foot printing and Enumeration is done this phase. Information like IP address, Ports & Services, OS, Application, Vulnerabilities etc are discovered.

Weaponization

After gathering data about the target, the attacker builds the weaponised payload which can be malware, ransomware, virus, worm etc that can exploit the vulnerabilities found on the target system.

Delivery

In this phase, the attacker sends the built weaponised payload through email, web, USB etc to the target.

Exploitation

In this phase, the malicious code is executed on the target machine.

Installation

In this phase, the malicious installs itself as a program in the target machine.

Command and control (C2)

In this phase, the attacker takes the remote control of target and starts to command the target by sending instructions.

Actions on objectives

In this phase, the attacker starts working on the objectives which could be stealing/exfiltration of data and bringing the system/service down.

Recent Posts

  • Cloud Attacks
  • Serverless Computing
  • Virtualization
  • Hypervisor
  • Containers
© 2026 KINGSANIT CYBERPEDIA | Powered by Minimalist Blog WordPress Theme