top of page

Cyber Kill Chain

A framework outlining the stages of a cyberattack, from reconnaissance to data exfiltration.

Understanding Cyber Kill Chain


The Cyber Kill Chain is a framework developed by Lockheed Martin to describe the stages of a cyber attack. It helps security teams analyze and disrupt attack progression.

Stages of the Cyber Kill Chain


  1. Reconnaissance: Gathering intelligence on the target.

  2. Weaponization: Creating malicious payloads.

  3. Delivery: Transmitting the payload via phishing, USBs, or web downloads.

  4. Exploitation: Exploiting vulnerabilities to gain access.

  5. Installation: Deploying malware to establish persistence.

  6. Command and Control: Connecting to an attacker-controlled server.

  7. Actions on Objectives: Executing malicious intent (e.g., data theft, destruction).

Common Applications


  • Threat Hunting: Detecting attacks in early stages.

  • Incident Response: Responding effectively to security breaches.

  • Red Team Exercises: Simulating cyber attacks for preparedness.

DC_stationary_R2-08.png

© 2025 DeepCytes. All Rights Reserved.

Locate Us

​Express Towers, Marine Drive,Nariman Point, Mumbai - 400021

Legal

Follow Us

bottom of page