Cyber Kill Chain

The Cyber Kill Chain is a framework created by Lockheed Martin to define and describe the steps use by an adversary to compromise and exfiltrate data in the cyberspace. The different phases involve in the kill chain can help us understand the adversary better and mitigate their various attacks successfully by breaking the chain. img: Lockheed Martin The attack phases involve in the kill chain are: Reconnaissance Weaponization Delivery Exploitation Installation Command and Control Actions on Objectives.
Read more →

Pyramid of Pain

A pyramid which represents how much pain we can cause to an adversary by detecting indicators of their attacks. img: SOCRadar The Pyramid Hash Values: Detecting of hash values as a indicator is fairly easy to evade for an adversary by simply changing just a bit from the file. So hash values are considered trivial and is ranked the lowest and widest in the pyramid. IP Address: It is easy for an adversary to use a lot of different IP addresses and since it doesn’t take time to spun up a new IP address, blocking of ip addresses are easy for an adversary to evade.
Read more →