The term kill chain was originally used as a military concept related to the structure of an attack; consisting of target identification, force dispatch to target, decision and order to attack the target, and finally the destruction of the target. Conversely, the idea of “breaking” an opponent’s kill chain is a method of defense or preemptive action. This model has seen some adoption in the information security community.
- Target identification
- Force dispatch to target
- Decision and order to attack the target
- Destruction of the target
Computer Security Model
Threats occur in up to seven stages. Not all threats need to use every stage, and the actions available at each stage can vary, giving an almost unlimited diversity to attack sets.
- Command and Control
- Actions on Objective
For Kali Linux: “Kill Chain” is a unified console that will perform these stages of attacks: Reconnaissance, Weaponization, Delivery, Exploit, Installation, Command & Control, and Actions
Dependant tool sets are:
1) Set — Social-Engineer Toolkit (SET), attacks against humans. 2) OpenVas — Vulnerability scanning and vulnerability management. 3) Veil-Evasion — Generate metasploit payloads bypass anti-virus. 4) Websploit — WebSploit Advanced MITM Framework.