-
Book Overview & Buying
-
Table Of Contents
Cyber Security Kill Chain - Tactics and Strategies
By :
The Cyber Kill Chain Installation phase represents a pivotal moment in which attackers secure a foothold within a target system by deploying malicious software. Following the initial stages of Reconnaissance, Weaponization, and Delivery discussed in previous chapters, the installation phase marks the point where the attack becomes deeply entrenched. This chapter will provide an in-depth overview of this critical phase. It will explore various installation methods, the techniques attackers use to embed malware, and how they ensure persistence within compromised networks. Key topics include persistence mechanisms, tools and technologies employed by attackers and defenders, and essential aspects of incident response. Persistence mechanisms will be examined, showcasing how attackers maintain access over time, including advanced techniques like rootkits and bootkits to evade detection. Additionally, the chapter will investigate the tools and technologies employed by both attackers...