Cybersecurity Kill Chain Summary
This section gave an overall picture of the phases commonly involved in cyber attacks.
It exposed the mindset of a Threat Actor and showed how a Threat Actor gets details about a target using simple methods and advanced intrusion tools to later use this information to attack users.
We discussed the two main ways through which Threat Actors escalate their privileges when they attack systems, and then explained how Threat Actors exfiltrate data from systems that they have access to.
We also looked at scenarios where Threat Actors proceed to attack the hardware of a victim to cause more damage, and then discussed ways through which Threat Actors maintain anonymity.
The chapter has highlighted ways through which users can interrupt the threat life cycle and thwart attacks and the tools used. The remainder of this chapter is a Lab in which you can go through a practical scenario in order to apply what you have learned thus far. You could do...