Developed by Lockheed Martin as a military model.

Reconnaissance

Understand the security posture:

Passive Reconnaissance

Gather publicly available data (IP Address, Domain Name, employee names, organizational structure). Use OSINT Fundamentals

Active Reconnaissance

Interact directly with target systems:

Weaponizaiton

Exploit written as a deliverable payload

Delivery

Payload written to a deliverable (executable, USB Flash Drive, Email)

Exploitation

Exploit a vulnerability to deploy the payload.

Installation

Install Malware

Command and Control

Command and control server communicates with malware

Actions

Run actions through the command and control server