The Cyberattack life cycle is a model used to describe how a typical attacker would advance their attack strategies through different stages. Each tax stage has a strategic goal. It must be completed for the next stage to begin.
We could stop the action anywhere in the change of deter, Break that attack,
click, attack or defense to learn more about that particular attack. Lifecycle
The first goal of an attacker is to perform reconnaissance through Discovery. Any enumeration.
The first attack phase focuses on identifying as many resource is possible through the use of sniffers, scanners spoofing an impersonation via social engineering
Next, Attackers determine which methods he used to compromise a targeted endpoint
Attackers deliver their weaponized payload to a target endpoint using these tools, such as email, instant messaging or I am
webpage redirection infected file shares.
Exploitation and exploit is an event that activates a weaponized payload.
An end user may unwittingly clicking malicious link or open an infected attachment. In an email.
An attacker also made remotely trigger an exploit My system. They have compromised
The next school of attack is escalation of privilege,
where the attacker installs a root kits or other malware, an attempt to gain root level control.
Commanding control. CNC
connections are established between infected endpoints and a CNC server, which is a master server that is designed to listen to individual compromised endpoints and respond with appropriate attack commands.
The terms bought in botnet often are used to describe an infected endpoint and a collection of infected endpoints that are simultaneously controlled by a CNC server. CNC traffic must be conducted in stealth mode
actions on the objective.
At this final stage, Attackers can finally achieved various goals, including data theft, destruction or modification,
network access and remote execution.