domain | thecyberpatch.com |
summary | **Summary:**
- **Cyber Kill Chain:** A model to understand and track the sequential steps of a cyberattack: - Reconnaissance: Initial information gathering about targets. - Weaponization: Preparation of exploit tools. - Delivery: Transmission of malware or exploits to targets. - Exploitation: Execution of malicious code on target systems. - Installation: Installation of malware or backdoors for persistence. - Command & Control (C2): Establishing communication with compromised systems. - Actions on Objectives: Achieving the attacker's goals, like data exfiltration.
- **Penetration Testing:** Conducted based on client-provided intrusion levels to evaluate target systems: - Relevant test types depend on agreed-upon intrusion levels and objectives. |
title | Home | TheCyberPatch |
description | Lomar created this blog to give back to the infosec community, and help others kick start and develop their career in the field of Information Security. |
keywords | read, security, information, knowledge, data, threats, attacks, tips, attack, development, password, career, privacy, system, network, penetration, patch |
upstreams |
christianselig.com |
downstreams |
|
nslookup | A 172.67.203.24, A 104.21.77.14 |
created | 2024-11-29 |
updated | 2025-04-24 |
summarized | 2025-04-24 |
|
|