The Command & Control Stage of the cyber kill chain is when the threat actor […]
Installation Stage (Cyber Kill Chain)
The Installation Stage of the Cyber Kill Chain is when the threat actor establishes a […]
Exploitation Stage (Cyber Kill Chain)
The Exploitation Stage is when we successfully execute the exploit we planned during the reconnaissance […]
Delivery Stage (Cyber Kill Chain)
The Delivery Stage of the Cyber Kill chain is when the threat actor has decided […]
Weaponization Stage (Cyber Kill Chain)
Weaponization in the cyber kill chain uses the intel the threat actor obtained from the […]
Reconnaissance Stage (Cyber Kill Chain)
The Reconnaissance Stage of the Cyber Kill Chain is where the threat actor probes their […]
Physical Layer (OSI Model)
The Physical Layer is where we finally transmit our data. It is also when we […]
Data Link Layer (OSI Model)
The Data Link is where we handle Media Access Control operations. It’s also how we […]
Network Layer (OSI Model)
The Network Layer of the OSI Model is where we have packets. These packets don’t […]
Transport Layer (OSI Model)
The Transport Layer of the OSI Model is where protocols such as UDP and TCP […]