This week we'll look at the fifth stage of the Cyber Kill Chain: Installation. Installation of a remote access trojan or backdoor on the victim system allows the adversary to maintain persistence inside the environment.
Conduct independent research into this phase of the Cyber Kill Chain and complete a 2-3 page narrative (double spaced) discussing what tools can be used to conduct this activity. Then, play the role of a consultant and advise a fictional Chief Information Security Officer (CISO) on how a countermeasure for this activity.
This week we'll look at the fifth stage of the Cyber Kill Chain: Installation. Installation of...