From the course: Introduction to the Cyber Kill Chain

Unlock the full course today

Join today to access over 25,200 courses taught by industry experts.

Exploitation

Exploitation

After delivery, the fourth step is exploitation. Attackers begin searching for holes they can exploit as soon as they have successfully implanted their malicious payload into the target system, similar to how a seeker may use a weakness in your hiding location to lure you in. Imagine you are playing a game of hide and seek. Exploitation in the Cyber Kill Chain is like the moment when the seeker finds you and take advantage of your hiding spots. It's the moment the attacker discovers a vulnerability in your system and exploits it to gain unauthorized access. Attackers can take advantage of weaknesses in different ways, like using bugs in software is one popular techniques. They look for vulnerabilities in unpatched or out-of-date operating systems, apps, or third-party software. An example is discovering a gap in a wall around your hiding place, which enables a seeker to reach in and seize you. Social engineering is another way used by attackers to take advantage of your systems. They…

Contents