In this article, we covered phases of the Cyber Kill Chain as part of the cyber threat intelligence series. The Cyber Kill Chain is one of three major threat intelligence frameworks, alongside the Diamond Model and Unified Kill Chain. It's emphasized that these are not competing models, but complementary tools to model adversary behavior and plan defenses.
The Cyber Kill Chain framework, originally developed by Lockheed Martin, breaks it down into clear stages. By understanding this sequence, we can better detect, prevent, and respond to threats!
Think of it as the attacker's playbook. Here are the typical steps:
1️⃣ Reconnaissance
2️⃣ Weaponization
3️⃣ Delivery
4️⃣ Exploitation
5️⃣ Installation
6️⃣ Command & Control (C2)
7️⃣ Actions on Objectives
See details in the below article
https://motasem-notes.net/the-cyber-kill-chain-explained-threat-intelligence-tryhackme/