Security Awareness

TryHackMe Cyber Kill Chain

CSNP Team April 17, 2023
TryHackMe Cyber Kill Chain

Learn about the Cyber Kill Chain framework developed by Lockheed Martin and how it helps security professionals understand and defend against cyber attacks.

Content by Dan Rearden

The Cyber Kill Chain is a security model designed for identification and prevention of network intrusions. Originally developed by Lockheed Martin, this framework adapts military targeting concepts for cybersecurity applications, helping security professionals understand what adversaries need to do to achieve their goals.

What is the Cyber Kill Chain?

The Cyber Kill Chain breaks down cyber attacks into seven distinct phases. By understanding these phases, defenders can identify attacks at each stage and implement appropriate countermeasures. The key insight is that attacks follow predictable patterns—and disrupting any single phase can stop the entire attack.

The Seven Phases

1. Reconnaissance

The attacker gathers information about the target before launching an attack.

  • Harvesting email addresses
  • Identifying employees on social media
  • Discovering public-facing technologies
  • Scanning for open ports and services

Defense: Limit public information exposure, monitor for scanning activity, implement threat intelligence.

2. Weaponization

The attacker creates a deliverable payload, combining an exploit with a backdoor.

  • Creating malicious documents
  • Developing custom malware
  • Packaging exploits with payloads

Defense: This phase happens outside your network, making direct defense difficult. Focus on detecting the results.

3. Delivery

The attacker transmits the weapon to the target environment.

  • Phishing emails with attachments
  • Malicious websites (watering holes)
  • USB drives left in parking lots
  • Compromised software updates

Defense: Email filtering, web proxies, user awareness training, USB restrictions.

4. Exploitation

The weapon's code is triggered, exploiting a vulnerability to execute.

  • Exploiting software vulnerabilities
  • Tricking users into running macros
  • Zero-day exploits

Defense: Patch management, endpoint protection, application whitelisting, DEP/ASLR.

5. Installation

The malware installs itself on the victim system, establishing persistence.

  • Installing backdoors
  • Creating scheduled tasks
  • Modifying registry keys
  • Installing rootkits

Defense: Endpoint detection and response (EDR), application control, file integrity monitoring.

6. Command and Control (C2)

The compromised system establishes communication with the attacker's infrastructure.

  • HTTP/HTTPS beaconing
  • DNS tunneling
  • Social media as C2 channels
  • Encrypted communications

Defense: Network monitoring, DNS analysis, proxy inspection, behavioral analytics.

7. Actions on Objectives

The attacker achieves their goal—data exfiltration, destruction, or other objectives.

  • Data theft and exfiltration
  • Ransomware deployment
  • Privilege escalation
  • Lateral movement to other systems

Defense: Data loss prevention, network segmentation, privileged access management.

Using the Kill Chain Defensively

Defense in Depth

Implement controls at multiple phases. If one control fails, others can still stop the attack.

Detection at Every Phase

Deploy detection capabilities that can identify attack indicators at each stage of the kill chain.

Intelligence-Driven Defense

Use threat intelligence to understand attacker TTPs and improve defenses at relevant phases.

Limitations and Evolution

While valuable, the Cyber Kill Chain has limitations:

  • Originally designed for external threats, less applicable to insider threats
  • Linear model may not reflect modern attack complexity
  • Does not address cloud or mobile-specific attack patterns

Modern frameworks like MITRE ATT&CK provide more granular detail and are often used alongside the Kill Chain.

Conclusion

The Cyber Kill Chain remains a foundational framework for understanding and defending against cyber attacks. By mapping defenses to each phase, organizations can build comprehensive security programs that disrupt attacks at multiple points.


Was this article helpful?

Related Articles

How to Become a Penetration Tester with Zero Experience In Five Steps
Implementation Guides
CSNP Team March 25, 2024

How to Become a Penetration Tester with Zero Experience In Five Steps

A practical guide to starting your penetration testing career from scratch, covering essential skills, certifications, and strategies for breaking into the field.

Read more
Unraveling the Where: A Deep Dive into Geolocation (GEOINT) for OSINT
Implementation Guides
CSNP Team July 31, 2023

Unraveling the Where: A Deep Dive into Geolocation (GEOINT) for OSINT

Learn how to conduct geolocation analysis using OSINT techniques. Discover tools and methods for identifying locations from photos and videos.

Read more
TryHackMe - Pyramid Of Pain Room
Security Awareness
CSNP Team December 5, 2022

TryHackMe - Pyramid Of Pain Room

Learn about the Pyramid of Pain framework and how security professionals use it to understand the difficulty adversaries face when changing their attack indicators.

Read more

Stay Updated

Subscribe to our newsletter for cybersecurity news and updates

We respect your privacy. Unsubscribe at any time.