preview

The Vulnerabilities And Cyber Kill Chain

Good Essays

A. ICS Vulnerabilities and Cyber Kill Chain
1. Reconnaissance - Summarize plausible active gathering, passive gathering, and active reconnaissance techniques that the adversary could have executed to gain intelligence on the target in the scenario.
Reconnaissance is the act of collecting background research necessary to identify and select targets. (1) Cyber reconnaissance is an important stage of a well-organized cyber-attack, and is also one of the most time-consuming activities. This phase can exploit the information gathered about the target’s weaknesses. The type of information the hacker is looking for is how to actually get in: firewall ports that are open, network hosts, services that are running. Critical information that should be obtained during the reconnaissance phase include network information, host information, security policies, and human information.
“Active reconnaissance is a type of computer attack in which an intruder engages with the targeted system to gather information about vulnerabilities.” (2) This type of information gathering involves doing something on the target network, which could potentially be tracked back to you. The idea of this phase is to gather IP addresses, subnet masks, network topologies, user names, operating systems, firewalls, password requirements and change frequency.
Passive reconnaissance is focused more around public information and not engaging with the targeted systems. “Typical passive reconnaissance can include

Get Access