@infosectrain
CYBER
KILL CHAIN STAGES
@infosectrain
Attackers probes for a weakness,
this might include harvesting login
credentials or information which
is useful
Reconnaissance
01
@infosectrain
Sending the weaponized bundle to the
victim through social engineering
techniques
Weaponization
02
@infosectrain
Build a deliverable payload using an
exploit and a backdoor
Delivery
03
@infosectrain
Executing code on the victim's system
Exploit
04
@infosectrain
Installing malware on the targeted
system
Installation
05
@infosectrain
Creating a channel where the attacker
can control a system remotely
Command and Control
06
@infosectrain
Attacker remotely carries out his
intended goal
Actions
07

Cyber Kill Chain Stages.pdf