September 2018
Intermediate to advanced
480 pages
9h 45m
English
This will be the final phase of the kill chain in which the adversary gets access to the system and is ready to execute a plan on it—this could be a data exfiltration (cyber espionage) mission in which the crown jewels of an organization are exfiltrated, a data destruction mission in which the data will be securely shredded or deleted in such a way that it can't be recovered in any way possible, or a ransom setup in which the important data will be encrypted and the threat actors will demand a ransom amount for decryption.
A red-teamer needs to know exactly how he or she can use the concept of CKC in order to get access to the target organization's network. However, to even perform this task, the red-teamers need to come up with a ...