What is aimed to improve understanding of attackers TTPs?
Lockheed Martin’s Cyber Kill Chain
What are the categories in Lockheed Martins Cyber Kill Chain
What describes the actions an adversary would take against a target, is designed for network defenders, and has the later stages broken into 11 tactic categories?
MITRE ATT&CK Matrix
What are the methods for footprinting?
The Hacker Methodology
What is passive collection of data about a target?
Footprinting
What is bulk assessment and identification of target and includes direct interaction?
Scanning
What are the methods for scanning?
What is aggressively probing and looking for vulnerabilities?
Enumeration
What are the methods of enumeration?
What is establishing a foothold on the target system?
Gaining access
What are the methods for gaining access?
What is taking full control of a system?
Escalating privileges
What are the methods for escalating privileges?
What is gathering information for a target system?
Pilfering data
What are the methods for pilfering data?
What is making sure users and admins don’t know we were there?
Covering tracks
What are the methods for covering tracks?
What is persisting on the system called?
Creating backdoors?
What are the methods for creating backdoors?
What is performing the end goal on the target called?
Actions on objectives
What are the methods ofactions on objectives?
Title 10
War
Title 50
Intelligence