pdf

HP - Kill Chain Use Case.pdf

Hp Kill Chain Use Case

Use case definition for detecting kill chain activity.

This page contains AI generated content. Errors or omissions may be present. Use human level critical thinking.
  • Q: What is the 'HP Attack Life Cycle'?
    A: A modified Kill Chain model.
  • Q: What is 'Reconnaissance'?
    A: Gathering info on the target.
  • Q: What is 'Weaponization'?
    A: Creating the exploit.
  • Q: What is 'Delivery'?
    A: Sending the exploit to the target.
  • Q: What is 'Exploitation'?
    A: Triggering the vulnerability.
  • Q: What is 'Installation'?
    A: Installing malware/backdoor.
  • Q: What is 'C2'?
    A: Command and Control.
  • Q: What is 'Actions on Objectives'?
    A: Stealing data or causing damage.
  • Q: What is 'Lateral Movement'?
    A: Moving between systems.
  • Q: What is 'Persistence'?
    A: maintaining access.

Ask a question

Have a doubt or need clarification?



I’m here to help. Share your question, and I’ll get back to you with the guidance you need regarding the course.

Thank you!

I have received your message and I shall get back to you shortly.