You are on page 1of 2

1 Reconnaissance

Harvesting Email Address, DOB etc.

Weaponization 2
Coupling malicious payload
with deliverable file

3 Delivery

Delivering weaponized bundle


using USB, Email, Web etc.

Exploitation 4
Exploiting Vulnerability to
execute weaponized bundle

5 Installation

Installing malware on asset

Command & Control (C2C) 6


Remote manipulation of victim

7 Action on Objective (AOO)

Objective of attack which can


include exfiltration/ destruction
of data or intrusion of another
target
1 Reconnaissance

Harvesting Email Address, DOB etc.

Weaponization 2
Coupling malicious payload
with deliverable file

3 Delivery
Delivering weaponized bundle
using USB, Email, Web etc.

Exploitation 4
Exploiting Vulnerability to
execute weaponized bundle

5 Installation

Installing malware on asset

Command & Control (C2C) 6


Remote manipulation of victim

7 Action on Objective (AOO)

Objective of attack which can


include exfiltration/ destruction
of data or intrusion of another
target

You might also like