Summary
In this chapter, we provided comprehensive coverage of the typical phases targeted cyber attack organizations face in terms of Microsoft Windows endpoints. In total, a typical cyber attack is split into three phases, which makes it much easier to understand even the most complex incidents. Here, we detailed each phase of the attack and enriched them with MITRE ATT&CK ® techniques. We also provided various examples of how adversaries think and act at various stages of the intrusion process, including a high-level review of their toolset. Throughout this book, you will see lots of examples from the real world, especially in the cybersecurity incidents we have been involved in.
This chapter covered various important aspects to help you understand the nature of cyber attacks, the various attack steps, the tools and techniques that are mapped to MITRE ATT&CK, and our unified kill chain of sophisticated cyber attacks. It results in less time being lost in understanding...