Developed by Lockheed Martin as a military model.
Reconnaissance
Understand the security posture:
- Find Network Topology Done via:
- Social Engineering
Passive Reconnaissance
Gather publicly available data (IP Address, Domain Name, employee names, organizational structure). Use OSINT Fundamentals
Active Reconnaissance
Interact directly with target systems:
- Probe for open ports Use Nmap, Metasploit, Netcat
Weaponizaiton
Exploit written as a deliverable payload
Delivery
Payload written to a deliverable (executable, USB Flash Drive, Email)
Exploitation
Exploit a vulnerability to deploy the payload.
Installation
Install Malware
Command and Control
Command and control server communicates with malware
Actions
Run actions through the command and control server