What is “Kill Chain”?
From Wikipedia: The term kill chain was originally used as a military concept related to the structure of an attack; consisting of target identification, force dispatch to target, decision, order to attack the target, and finally the destruction of the target.
- Reconnaissance – Uses social engineering to find weaknesses in the target’s security posture.
- Weaponization – Crafting attack tools for the target system.
- Delivery – Delivering the attack tools to the target system.
- Exploit – The malicious file intended for an application target system or the operating system vulnerabilities control objectives is opened by the victim on target system.
- Installation – Remote control program installed on target system.
- Command & Control – Successfully compromised hosts will create a C2 channel on the Internet to establish a connection with the C2 server.
- Actions – After the preceding process, the attacker will continue to steal information about the target system, undermine the integrity and availability of information, and further to control the machine to jump to attack other machines, to expand the sphere of influence.
Dependent tool sets are:
- Tor — For the console build-in anonymizer.
- Set — Social-Engineer Toolkit (SET), attacks against humans.
- OpenVas — Vulnerability scanning and vulnerability management.
- Veil-Evasion — Generate metasploit payloads bypass anti-virus.
- Websploit — WebSploit Advanced MITM Framework.
- Metasploit — Executing exploit code against target.
- WiFite — Automated wireless auditor, designed for Linux.
This is only an educational purposes only I am not responsible for further activities
Join my forum and learn more ethical hacking and penetration testing
Get me at