From the course: Introduction to the Cyber Kill Chain

Unlock the full course today

Join today to access over 25,200 courses taught by industry experts.

Command and control

Command and control

At this phase, the attackers create hidden lines of communication with the hacked systems. We can imagine this phase as to how hackers might build up a covert network of walkie-talkies or secret messages to stay in touch and issue commands to the infiltrated systems. Different methods, such as remote access to, or even secret channels established within normal network traffic to evade detection, can be used to create these communication channels. Now let's go back to the example of the hide-and-seek game. But in this scene, the target system are behind us and the attackers are the seekers. Once the attackers have gained access to the target systems, they might find a means of managing and controlling their actions without being discovered. The command and control phase enters the picture at this point. The attackers can remotely manipulate the compromised systems and give them instructions on what to do by using these communication channels. It's as if the attackers are taking on the…

Contents