Initial access
This is usually the first step of the kill chain where we, as defenders, have a chance to stop the attackers trying to get a first foothold in our network.
As we discussed in Chapter 1, Contextualizing Threats and Today's Challenges, phishing and exploiting remote services are used to get initial access to an information system. These are the two techniques we will explore in this section.
T1566 – Phishing
It is impossible to go through the initial access tactics without talking about phishing techniques. This technique is one of the most common techniques to gain the first foothold in an internal network, for several reasons. The first one could be the success rate linked to this technique because many people – especially non-technical users – lack awareness and therefore can be oriented and manipulated to click or open a document that will allow external attackers to move on to the next step of the kill chain. There's also...