Real Hacking: Learn The Cyber Kill Chain

preview_player
Показать описание
The cyber kill chain is a 7-step process to hack into targets. Examples of targets might include devices, networks, or organizations. Just as how computer networking has a conceptual model of layers, hacking has phases. The violent “kill” aspect of the term stems from its heritage in military operations. It all starts of with:

(1) Reconnaissance. There's never enough scouting and research to prep in advance before an engagement. Reconnaissance doesn't mean host and port scanning and service enumeration. It can also include methods OSINT, in-person scouting, and pattern-of-life analysis. The more diligence performed at the recon stage, the easier it is to hack later on in the cyber kill chain.

(2) Weaponization. This might be the most involved stage of the cyber kill chain. A better word might be "payload-ization." Cyber tools aren't kinetic weapons that create kinetic destruction. Rather they are more like spells to give the caster access and influence over a target. To hack, you need both an exploit and a payload. The exploit lets you take control over the thread of execution for a victim process. The payload is the code you want to run on top of the hijacked process. Often, for client-side attacks, you’ll have to hide both in a benign file or webpage to have a user start the hack.

(3) Delivery. There's a lot of ways to send data from Point A to Point B. Getting remote execution at the same time is the hard part. Sometimes this involves co-opting a user to help you. Other times you can fire off an exploit at a running service directly across the Internet. In some cases, you can have malware installed on a system en-route from the factory. Client-side, service-side, and supply-chain attacks are all forms of delivery methods.

(4) Exploitation. The point of code execution is where all the magic happens. This determines whether the hack actually succeeds. But exploitation isn't just a singular event. There's a ton of engineering time required to turn a proof-of-concept into a reliable tool. Bypassing memory protections or sandboxing methods are examples of feats needed for execution.

(5) Installation. Hacking is much more than remote access. It means maintaining persistence so you can access on-demand. Hand-in-hand with installation in the cyber kill chain is maintaining persistence. To survive a reboot or even re-format is important to make sure the previous steps don't go to waste. Persistence does increase the potential for detection though. Memory-only installation, rootkits, encrypted virtual file systems are some ways to maintain stealth.

(6) Command & Control. E.T. needs to phone home. If there's a network, the problem lies in keeping stealthy. If there's no network, then the problem lies phoning home without a phone. The C2 aspect of the cyber kill chain determines successful follow-on objectives. If you can’t communicate without detection, it'll be a short-lived hacking operation.

(7) Actions on the Objective. Real hacking always has a purpose to it. There’s little point in all the hard work of Steps 1-6 of the cyber kill chain if there’s no end-state to achieve. Depending on the threat actor, it can be for intel gathering, espionage, or financial gain. The actions on the objectives should support the end state. Tactically, this may be stealing data and expanding access to other devices.

----- RESOURCES -----

Intelligence-Driven Computer Network Defense, Lockheed Martin:

The Unified Kill Chain, Paul Pols:

00:00 Different Levels of Warfare and Cyber Operations
00:46 The Cyber Kill Chain Framework
01:41 How Hacking Parallels Military Operations
02:42 Step 1: Reconnaissance
04:23 Step 2: Weaponization
05:53 Step 3: Delivery
08:18 Step 4: Exploitation
09:35 Step 5: installation
10:52 Step 6: Command-and-Control
12:55 Step 7: Actions on the Objective
13:21 Strategic Considerations of Hacking

#Hacking #KillChain #Cyberspatial
Рекомендации по теме
Комментарии
Автор

What do you think is the most important part of the cyber kill chain?

Cyberspatial
Автор

I can clearly see the effort you put into your videos! I just discovered your channel, and I'm not exaggerating when I say that I fell in love with the way you structure your videos! So clear and linear! Wow! Keep it up!

thecomedian
Автор

I am loving your channel. Such high quality content!

seclilc
Автор

Interesting... you've just summed up general ideas of the entire course of Information Security at my Uni in less than 15 mins. Lol. Thanks for the video!

marshallquocnguyen
Автор

This's quality content! You actually referenced a "scientific" work, which could help understand more internally this kill chain! Also, the video is really impressive and engaging.

oscard
Автор

We are growing so fast. Keep it up, don't change your quality line please!

frkangungor
Автор

YOUR CHANNEL IS ABSOLUTELY MIND BLOWING.AM SURE THAT YOU ARE UNKNOWN FOR SOMEHOW.YOUR CHANNELS ARE PROVIDING VERY GOOD CONTENT BY PROVIDING EASY EXAMPLES AND VISUAL CONTENT.PLEASE DONT STOP YOUR CHANNEL CONTINUE WITH MORE AND MORE CONTENT.AM VERY INTERESTED IN CYBER SECURITY SO PLEASE DO MORE CYBER SECURITY VIDEOS.SUPPOERT FROM INDIA.

mubinrichu
Автор

Following since you had around 400 views. Happy to see that you are blowing up : D

esxdzkt
Автор

I LOVE YOUR WORK OF QUALITY AND PROPER EXPLANATION YOU'RE NOT LIKE MOST OF THESE GUYS ON YOUTUBE CLAIMING TO BE SECURITY PROFESSIONALS..🔥🔥🔥

john-jvlm
Автор

I am surprised by the quality of your content and the fewer views on it! I wonder why this channel is not that bigger than it should be. I am learning so much from you!! From the bottom of my heart, thank you. Keep up the good work.

muhammadadnan
Автор

I appreciate your extremely clear presentation of the steps with good examples, without getting stuck in the weeds or showing off. The big picture. It would be nice if you developed a reading list for us to download, as well as your favorite videos, books, and manuals, in addition to your own videos. Lastly, maybe even suggest institutions and other places to learn cybersecurity or warfare, from the best to the worst. Loved the presentation. The videography and sound are good. Well spoken. Clear, interesting, good pacing.

LeonCouch
Автор

You are doing a great job explaining these things. It’s not overly simplified, but it’s not overwhelming either. Thank you!

douglasrichter
Автор

This is probably the most comprehensive security channel on youtube

tylercoombs
Автор

Damn such good production .. times are changing

rayancrasta
Автор

I love this channel, how did I just find it?! many people have the knowledge, but few can convey it so clearly and with such high production. Love the visuals and the explanation!

dddonehoo
Автор

Love your content and your style. Don't stop 🙏

vitusbo
Автор

OMG... I missed your videos in last 10months bcas... I found your chennal just You great .... bcas i love your face when you pronounce words..😍.. and your content tooo clear and easy to understand..🔥🔥

yuvi_white_hat
Автор

Not to exaggerate but I love this channel.
Bravo to the creator of this video.

I just found out this channel and it's helping me well.
Thanks alot.

aketowangatracyruth
Автор

Whenever I get notified by ur video's I'm soon excited & motivated more & ....

imuser
Автор

Great video . short, sharp and detailed - but not too much detail. Thanks

GCS