Focus2Learn
  • Way2Learn
  • OSI Model
    • Intro
    • OSI Model Layers - Functions and Protocols
    • TCP/IP Protocol Suite
    • Layers Functionalities
    • TCP and UDP ports
    • Network Connecting Devices
    • Network Security Devices
    • Network Vulnerability
    • Kerbros
  • Architectures
    • Qradar
    • Splunk ES
    • SOC Analyst Work Culture
    • Playbooks
  • Information Security
    • AAA
    • CIA Traid
    • Cyber Attacks
    • Cyber Kill Chain
    • Threat - Vulnerability - Exploit - Risk
    • MITRE ATT&CK Framework
    • Spoofing Attacks
  • Log Analysis
    • SSL
    • Splunk Queries
    • Log Aggregation, Processing and Analysis for Security
    • Firewall Logging
    • Proxy Server
    • DNS Server
    • Email Analysis
    • Network Data Analysis
    • Web Application Security
    • Threat Hunting with Microsoft O365 Logs
    • Darktrace
    • EDR
    • Random Topics
    • Incident Response
    • Windows Logs
    • Windows Ransomware Detection
    • Ref Diagrams
  • External Sites
    • Fav Links
    • Cyber-Kill-Chain_YouTube_Link
    • OWASP TOP 10 - 2017
    • Splunk UseCases
    • CCNA Course
    • Switch
    • Port Numbers
    • Windows Event IDs
    • Splunk-Oxygen
    • Privilege Escalation Attack
    • Threat Hunting with Splunk
  • PDF Files
    • Imp PDF Files
  • Online Reputation Checking Tool
  • AWS Cloud Security
    • AWS GuardDuty
  • Security Controls
  • CrowdStrike
    • Falcon Queries
    • User Sessions Hunting
    • Day to Day
    • Hunting Falcon
  • DarkTrace
    • Ref Links
  • Web Application Security
    • Links
Powered by GitBook
On this page
  • Overview
  • Reconnaissance
  • Weaponization
  • Delivery
  • Exploitation
  • Installation
  • Command and Control
  • Actions on Objective
  • Exfiltration
  • --
  • Miscellaneous
  • An example of indicators matched in CKC
  • Courses of Action Matrix
  • Security controls you can use to stop the Kill Chain
  • Reference

Was this helpful?

  1. Information Security

Cyber Kill Chain

It is a cybersecurity framework that offers a method to deal with the intrusions on a computer network.

PreviousCyber AttacksNextThreat - Vulnerability - Exploit - Risk

Last updated 4 years ago

Was this helpful?

Overview

The attacker performs reconnaissance, intrusion of the security perimeter, exploitation of vulnerabilities, gaining and escalating privileges, lateral movement to gain access to more valuable targets, attempts to obfuscate their activity, and finally exfiltrate data from the organization.

Intruder picks a target, researches it, and looks for vulnerabilities

  • Detect: Web Analytics; Threat Intelligence; Network Intrusion Detection System

  • Deny: Information Sharing Policy; Firewall Access Control Lists

Intruder develops malware designed to exploit the vulnerability

  • Detect: Threat Intelligence; Network Intrusion Detection System

  • Deny: Network Intrusion Prevention System

Intruder transmits the malware via a phishing email or another medium

  • Detect: Endpoint Malware Protection

  • Deny: Change Management; Application Whitelisting; Proxy Filter; Host-Based Intrusion Prevention System

  • Disrupt: Inline Anti-Virus

  • Degrade: Queuing

  • Contain: Router Access Control Lists; App-aware Firewall; Trust Zones; Inter-zone Network Intrusion Detection System

The malware begins executing on the target system

  • Detect: Endpoint Malware Protection; Host-Based Intrusion Detection System

  • Deny: Secure Password; Patch Management

  • Disrupt: Data Execution Prevention

  • Contain: App-aware Firewall; Trust Zones; Inter-zone Network Intrusion Detection System

The malware installs a backdoor or other ingress accessible to the attacker

  • Detect: Security Information and Event Management (SIEM); Host-Based Intrusion Detection System

  • Deny: Privilege Seperation; Strong Passwords; Two-Factor Authentication

  • Disrupt: Router Access Control Lists

  • Contain: App-aware Firewall; Trust Zones; Inter-zone Network Intrusion Detection System

The intruder gains persistent access to the victim’s systems/network

  • Detect: Network Intrusion Detection System; Host-Based Intrusion Detection System

  • Deny: Firewall Access Control Lists; Network Segmentation

  • Disrupt: Host-Based Intrusion Prevention System

  • Degrade: Tarpit

  • Deceive: Domain Name System Redirect

  • Contain: Trust Zones; Domain Name System Sinkholes

Intruder initiates end goal actions, such as data theft, data corruption, or data destruction

  • Detect: Endpoint Malware Protection

  • Deny: Data-at-Rest Encryption

  • Disrupt: Endpoint Malware Protection

  • Degrade: Quality of Service

  • Deceive: Honeypot

  • Contain: Incident Response

  • Detect: Data Loss Prevention; Security Information and Event Management (SIEM)

  • Deny: Egress Filtering

  • Disrupt: Data Loss Prevention

  • Contain: Firewall Access Control Lists

Miscellaneous

An example of indicators matched in CKC

Courses of Action Matrix

Security controls you can use to stop the Kill Chain

To apply the Cyber Kill Chain, Lockheed Martin provides the following layers of control implementation:

  • Detect: Determine when and how an attacker is performing recon against your organization or network.

  • Deny: Stop the attack from occurring by preventing information disclosure or unauthorized access.

  • Disrupt: Change or stop the flow of information or exfiltration of data to the attacker.

  • Degrade: Limit the effectiveness or efficiency of an attack.

  • Deceive: Interfere with an attack using misdirection or misinformation.

For our purposes, we’ll add one more layer:

  • Contain: Limit the scope of an attack to particular segments of your network or organization.

Reference

Reconnaissance

Weaponization

Delivery

Exploitation

Installation

Command and Control

Actions on Objective

Exfiltration

--

➖
➖
➖
➖
➖
➖
➖
➖
➖
➖
➖
➖
➖
➖
➖
❌
➖
➖
➖
➖
➖
➖
➖
Click Here
Reconnaissance
Weaponization
Delivery
Exploitation
Exploitation-Cont...
Installation
C2
Actions On Objectives
Courses of action Matrix