Skip to content

An overview of the Lockheed Martin Cyber Kill Chain, a framework that models the stages that an attacker may go through to achieve a successful cyber attack.

Notifications You must be signed in to change notification settings

wizardy0ga/Cyber-Kill-Chain

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 

Repository files navigation

The Cyber Kill Chain

Overview

The cyber kill chain is an intrusion model developed by Lockheed Martin in 2011, based on the kill chain military model, which displays the necessary stages for a successful attack. The cyber kill chain breaks down the seven stages that an attacker may go through to accomplish their intrusion objectives. As a defender, this model provides a framework for placing obstacles at each step of the attacker's cyber intrusion attempt. Incorporating the cyber kill chain into an organization's defense posture can provide a robust defense against attackers with TTP's that follow the stages of the kill chain. This model is not inclusive of all TTP's in use by attackers and should not be regarded as a monolithic structure for all attacks.

Reconnaissance

Recon is the first stage in the cyber kill chain model. During this stage, the attacker will enumerate their target either passively or actively with the goal of collecting as much information about the target organization as possible. In active recon, the attacker will make contact with their target through various methods such as port scanning internet facing devices or contacting the organization. In passive recon, the attacker makes no contact with the target and relies entirely on OSINT to collect information about their target. When the attacker feels that an actionable vulnerability has been found, they will move into the second phase of the kill chain.

Weaponization

This is the second phase of the kill chain. When the attacker has found an actionable vulnerability, their next goal will be coupling the vulnerability with an exploit that executes a piece of malware on the target host. This process is called weaponization and during this time, the attacker will be focused on engineering their malware into a deliverable payload that will evade known security mechanisms and perform the functions that the attacker seeks to execute on the target computer. More or less time will be spent researching, acquiring and configuring available malware or developing ones own malware depending on the needs and sophistication of the attacker. When the final payload is ready for delivery to the target, the attacker moves into the delivery phase.

Delivery

The delivery phase is the stage of an attack where the adversary attempts to pass their weaponized payload on to the target machine. Delivery of the payload depends on the TTP's of the adversary. Typically, the payload is delivered through phishing since the human is most vulnerable to exploitation. The payload may also be delivered through remote exploitation of vulnerable internet facing devices or through physical means such as keystroke injectors and other malicious physical media. Once the payload has been delivered to the target, the attack moves into the fourth phase of the kill chain.

Exploitation

The fourth phase of the kill chain is exploitation. During this phase, the attacker will now exploit the vulnerabilities discovered during reconnaissance, with the weaponized payload that has been delivered to the target host. The goal of exploitation is to gain an initial foothold into the network. Once the attacker has this foothold, they will proceed to enumerate the network's interior, searching for further vulnerabilities to exploit that are not reachable from the network perimeter. This often results in lateral movement and privilege escalation. When the attacker has assumed enough privilege within the network, they will move into the installation phase.

Installation

During the installation phase, the attacker will install a persistent backdoor to ensure that they remain inside the network. The attackers may also pack in other tools to aid accomplishing their objectives. When the attackers have finished the installation and configuration of their post exploitation tooling, they will move into the sixth phase of the kill chain, command and control.

Command and Control

In the command and control phase, the attacker will establish a connection between their newly installed implants and CnC servers. This connection allows the attackers to remotely control the infected machines via communications from the server over the command channel to the implant on the machine. It is through this communication channel that the attacker will move into the seventh and final stage of the attack, actions on objectives.

Actions on Objectives

This is the final phase of the cyberattack. The attacker will now have enough control over the network to accomplish their initial goals that motivated them to compromise the network. Utilizing the command and control communication channel between the attackers server and the implanted host machines, the attacker will be able to perform various actions such as data exfiltration, DDoS attacks, extortion or other malicious activities.

About

An overview of the Lockheed Martin Cyber Kill Chain, a framework that models the stages that an attacker may go through to achieve a successful cyber attack.

Topics

Resources

Stars

Watchers

Forks