Scan QR code or get instant email to install app
Question:
After completing the exploitation phase in a penetration test based on the Cyber Kill Chain model, the next step for Jackie would be to install the payload or malware on the target system. This is the fourth step in the Cyber Kill Chain model, and it involves the attacker gaining access to the system by exploiting a vulnerability and then installing the malware or payload. After this step, the attacker would typically establish a command and control connection with the compromised system and then carry out their intended actions. However, in a penetration test, the goal is to identify vulnerabilities and provide recommendations for improving security, rather than carrying out malicious actions.
The Cyber Kill Chain model is a framework that describes the stages of a typical cyber attack. It consists of seven steps, which are:
1. Reconnaissance: The attacker gathers information about the target system or organization.
2. Weaponization: The attacker creates or acquires a weapon, such as malware or a phishing email.
3. Delivery: The attacker delivers the weapon to the target system, often through email or a compromised website.
4. Exploitation: The weapon is used to exploit a vulnerability in the system.
5. Installation: The attacker installs the payload or malware on the target system.
6. Command and Control: The attacker establishes a connection to the compromised system and gains control over it.
7. Actions on Objectives: The attacker carries out their intended actions, which could include stealing data, disrupting operations, or causing damage.
Therefore, the Cyber Kill Chain attack has seven steps.
Comments