You are on page 1of 1

APT CKC Attack Chain

Reconnaisance Weaponization Delivery Exploitation Installation C2C AOO

Social Network Software Removable Tunneling Data


Host Based Vulnerabilities
Engineering based Media over Destruction
protocols
Passive Web Àbusing Website Data
Benign equipping Zero Day Known Exfiltration
Based tools
Application HTTP (S) FTP SSH/ TLS ICMP DNS
Macros
Subterfuge
trick
SQL
Legitimate injection
Digital
certification
Drive by
Download
Spear Removable Rogue
Water holing Credential
Phishing media Software
Reuse
Malicious
Attached Compromised
file Websites
Windows platform Multi Platform
Spear techniques Techniques
Phishing Rogue DNS
Link

DLL Search
Modifying DLL Side Startup COM
order
registry key loading Folder Hijacking Bootkit
hijacking

Create
Account

Local job
Scheduling

You might also like