cyber killchains

This commit is contained in:
Stefan Friese 2022-09-27 23:10:16 +02:00
parent 213be0b541
commit 4c3b2c96c2
1 changed files with 65 additions and 0 deletions

65
misc/Killchains.md Normal file
View File

@ -0,0 +1,65 @@
# Security Killchains
Frameworks of killchains are inherited from the military and separate steps in which an attack occurs.
## Lockheed & Martin
* [Lockheed & Martin's Cyber Kill Chain Website](https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html)
1. Reconnaissance
2. Weaponization
3. Delivery
4. Exploitation
5. Installation
6. Command & Control
7. Actions on Objectives
## Mitre ATT&CK Matrix
[Mitre ATT&CK](https://attack.mitre.org) is a matrix of __Tactics, Techniques and Procedures (TTP)__ of adversaries called __Adanced Persistent Threats (APT)__. The tactics are
1. Reconnaissance
2. Resource Development
3. Initial Access
4. Execution
5. Persistence
6. Privilege Escalation
7. Defense Evasion
8. Credential Access
9. Discovery
10. Lateral Movement
11. Collection
12. Command and Control
13. Exfiltration
14. Impact
[Crowdstrike](https://crowdstrike.com) as a threat intelligence tool is built on the Mitre ATT&CK framework.
## Unified Cyber Kill Chain
[The Unified Cyber Kill Chain](https://unifiedkillchain.com) is the youngest and
most detailed framework and builds upon the other frameworks. It contains combined
stages which are seen as lifecycles with potentially repeatable steps.
1. Reconnaissance
2. Weaponization
3. Delivery
4. Socical Engineering
5. Exploitation
6. Persistance
7. Defense Evation
8. Command & Control
9. Pivoting
10. Discovery
11. Privilege Escalation
12. Execution
13. Credential Access
14. Lateral Movement
15. Collection
16. Exfiltration
17. Impact
18. Objectives
Mentioned lifecycles are __Inital Foothold__, __Network Propagation__ and
__Actions on Objective__