kill chain
kill chain: Reconnaissance Intrusion Exploitation Privilege Escalation Lateral Movement Obfuscation / Anti-forensics Denial of Service Exfiltration Reconnaissance The observation stage: attackers typically assess the situation from the outside-in, in order to identify both targets and tactics for the attack. Intrusion Based on what the attackers discovered in the reconnaissance phase, they’re able to get into your systems: often leveraging malware or security vulnerabilities. Exploitation The act of exploiting vulnerabilities, and delivering malicious code onto the system, in order to get a better foothold. Privilege Escalation Attackers often need more privileges on a system to get access to more data and permissions: for this, they need to escalate their privileges often to an Admin. Lateral Movement Once they’re in the system, attackers can move laterally to other systems and accounts in order to gain more leverage: whether that’s higher permissio...