2023-03-20 01:48:23

Actions On Objectives (Cyber Kill Chain)


The Actions On Objectives Stage is the end of a Cyber Attack. The threat actor has achieved their goals.



In a ransomware attack, this would be the point it has spread as much as it could have until the attack termina...

2023-03-19 01:57:15

Command & Control Stage (Cyber Kill Chain)


The Command & Control Stage of the cyber kill chain is when the threat actor establishes persistence.



Not every cyber attack deals with persistence the same. Ransomware might not be persistent as other cyber atta...

2023-03-18 02:30:27

Installation Stage (Cyber Kill Chain)


The Installation Stage of the Cyber Kill Chain is when the threat actor establishes a foothold in the target's infrastructure. The victim of the attack should start to notice signs of an attack if they are monitoring.

...

2023-03-17 01:01:46

Exploitation Stage (Cyber Kill Chain)


The Exploitation Stage is when we successfully execute the exploit we planned during the reconnaissance stage, which was prepared and delivered on the delivery stage.



We usually merely gain initial access as the resu...

2023-03-16 00:44:27

Delivery Stage (Cyber Kill Chain)


The Delivery Stage of the Cyber Kill chain is when the threat actor has decided on a method to deliver the malware the threat actor created.



One popular method of delivering malware is a variant of phishing. It may n...

2023-03-15 01:19:49

Weaponization Stage (Cyber Kill Chain)


Weaponization in the cyber kill chain uses the intel the threat actor obtained from the reconnaissance stage to create a suitable piece of malware to infect their target.



The specific malware used will depend on the ...

2023-03-13 23:43:21

Reconnaissance Stage (Cyber Kill Chain)


The Reconnaissance Stage of the Cyber Kill Chain is where the threat actor probes their target as thoroughly as he/she can so that the threat actor can gather as much intel as he/she can.



The Recon Stage is also wher...

2023-03-12 23:40:13

Physical Layer (OSI Model)


The Physical Layer is where we finally transmit our data. It is also when we initially receive data.



When we send data, we translate frames into bits and transmit them through the respective medium, be it twisted pai...

2023-03-11 21:08:48

Data Link Layer (OSI Model)


The Data Link is where we handle Media Access Control operations. It’s also how we deal with routing traffic. The Network Layer is where we do the IP Addressing, but when we IP route, we need to work with MAC Addresse...

2023-03-11 00:03:32

Network Layer (OSI Model)


The Network Layer of the OSI Model is where we have packets. These packets don’t yet have a destination when your sending data.



While they don’t have a destination, this is where we give them an address to go. Wh...