Cyber Kill Chain

Cyber Kill Chain

One-liner: A 7-stage framework by Lockheed Martin that maps the phases of a cyberattack from reconnaissance to objective execution.

🎯 What Is It?

The Cyber Kill Chain is a cybersecurity framework introduced by Lockheed Martin in 2011, inspired by military kill chain concepts. It helps organizations understand how cyberattacks are conducted by breaking them into sequential stages. By understanding each stage, defenders can interrupt attacks before they reach their objectives.

🔬 The Seven Stages

Stage Name Attacker Goal Defender Focus
1 Reconnaissance Gather information about the target Minimize exposure, monitor for scans
2 Weaponization Create/modify payload for target vulnerabilities Disable risky features (macros), user training
3 Delivery Transmit payload to target environment Email/web filtering, WAFs
4 Exploitation Execute payload via vulnerability or weak auth Patching, MFA, IPS
5 Installation Establish persistence (backdoors, malware) EDR, application allowlisting
6 Command and Control (C2) Create covert communication channel Network monitoring, DNS analysis
7 Actions on Objectives Execute goals (exfiltration, ransomware) DLP, network segmentation

📊 Stage Deep Dive

Stage 1: Reconnaissance

Information gathering about the target's vulnerabilities and weaknesses.

Stage 2: Weaponization

Creating a deliverable malicious payload tailored to discovered weaknesses.

Stage 3: Delivery

Transmitting the weaponized payload to the target.

Stage 4: Exploitation

The payload executes and exploits a vulnerability.

Stage 5: Installation

Establishing persistent access to the compromised system.

Stage 6: Command and Control

Setting up covert communication for remote control.

Stage 7: Actions on Objectives

Executing the attacker's ultimate goal.

🛡️ Breaking the Chain

The key defensive principle: interrupt at any stage to prevent objective completion.

Early Detection = Less Damage
─────────────────────────────
Recon → Weaponize → Deliver → Exploit → Install → C2 → Actions
  ↑         ↑          ↑         ↑         ↑       ↑       ↑
Block    Disable     Filter    Patch     EDR   Monitor   DLP
 info    macros      email     vulns           traffic

🎤 Interview Angles

Common Questions

Key Talking Points

❌ Limitations

📚 References