Hacking, Penetration Testing

Kill chain attacks with Kali

The term kill chain was originally used as a military concept related to the structure of an attack; consisting of target identification, force dispatch to target, decision and order to attack the target, and finally the destruction of the target.[1] Conversely, the idea of “breaking” an opponent’s kill chain is a method of defense or preemptive action. This model has seen some adoption in the information security community.

Military Model

  • Target identification
  • Force dispatch to target
  • Decision and order to attack the target
  • Destruction of the target

Computer Security Model

Threats occur in up to seven stages. Not all threats need to use every stage, and the actions available at each stage can vary, giving an almost unlimited diversity to attack sets.[6]

  • Reconnisance
  • Weaponization
  • Delivery
  • Exploitation
  • Installation
  • Command and Control
  • Actions on Objective


For Kali Linux: “Kill Chain” is a unified console that will perform these stages of attacks: Reconnaissance, Weaponization, Delivery, Exploit, Installation, Command & Control, and Actions

Dependant tool sets are:

1) Set — Social-Engineer Toolkit (SET), attacks against humans. 2) OpenVas — Vulnerability scanning and vulnerability management. 3) Veil-Evasion — Generate metasploit payloads bypass anti-virus. 4) Websploit — WebSploit Advanced MITM Framework.

Download from github.