{"id":1121,"date":"2020-10-30T21:06:49","date_gmt":"2020-10-31T02:06:49","guid":{"rendered":"https:\/\/truxgoservers.com\/blog\/?p=1121"},"modified":"2020-10-30T21:06:51","modified_gmt":"2020-10-31T02:06:51","slug":"the-steps-of-the-cyber-kill-chain-and-what-is-it","status":"publish","type":"post","link":"https:\/\/truxgoservers.com\/blog\/the-steps-of-the-cyber-kill-chain-and-what-is-it\/","title":{"rendered":"The steps of the Cyber Kill Chain and what is it?"},"content":{"rendered":"\n<p>To detect and combat Cyber Kill Chain attacks in time, it is necessary to know in detail the strategies of cyber thieves. This is the only way to take appropriate action. And this is exactly where Cyber \u200b\u200bKill Chain comes in.<\/p>\n\n\n\n<p>The Cyber Kill Chain has become a list of steps that must be taken into account to know how things are being done in terms of security, if companies are truly protected and, in the event of an incident, where the chain could have been broken. This was Invented by the incident team at security firm Lockheed Martin, this model has been followed by many security experts, some of whom have looked to its evolution.<\/p>\n\n\n\n<p>As if it were a chain of attack, the path that an intruder has to take to penetrate systems and carry out his attacks. It also serves to set policies, study available defense technologies, and calculate the costs of failure.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The phases of the Kill Chain<\/h2>\n\n\n\n<p><strong><em>\u25b8Recognition:<\/em><\/strong> Learning about the target using various techniques.<\/p>\n\n\n\n<p><strong><em>\u25b8Creation of the weapon:<\/em><\/strong> Adaptation of the malware code to the medium on which the infection will be searched.<\/p>\n\n\n\n<p><strong><em>\u25b8Delivery:<\/em><\/strong> Transmitting the malware code through some means.<\/p>\n\n\n\n<p><strong><em>\u25b8Exploitation:<\/em><\/strong> Exploiting a vulnerability in the software or human error to execute the malicious software. <\/p>\n\n\n\n<p><strong><em>\u25b8Installation:<\/em><\/strong> Malicious software ensures that it can run permanently on the infected computer.<\/p>\n\n\n\n<p><strong><em>\u25b8Command &amp; Control (C2):<\/em><\/strong> The malware communicates with its central, giving attackers remote control.<\/p>\n\n\n\n<p><strong><em>\u25b8Actions on the objectives:<\/em><\/strong> Proceed to theft or the execution of what is proposed to do.<\/p>\n\n\n\n<p>It is possible to assign a viable set of defenses for each of the phases of the Kill Chain which, in its version, ensures that it is a great model for the prevention of advanced attacks. This model has been followed by many security experts, some of whom have sought the evolution of this version and thus be able to guarantee much more security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>To detect and combat Cyber Kill Chain attacks in time, it is necessary to know in detail the strategies of cyber thieves. This is the only way to take appropriate action. And this is exactly where Cyber \u200b\u200bKill Chain comes in. The Cyber Kill Chain has become a list of steps that must be taken [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1122,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[36],"class_list":["post-1121","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The steps of the Cyber Kill Chain and what is it? - Truxgo Server Blog<\/title>\n<meta name=\"description\" content=\"Cyber Kill Chain would be a chain of steps that can be applied by both users and experts in this subject and will see this subject.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/truxgoservers.com\/blog\/the-steps-of-the-cyber-kill-chain-and-what-is-it\/\" \/>\n<meta property=\"og:locale\" content=\"es_MX\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The steps of the Cyber Kill Chain and what is it? - Truxgo Server Blog\" \/>\n<meta property=\"og:description\" content=\"Cyber Kill Chain would be a chain of steps that can be applied by both users and experts in this subject and will see this subject.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/truxgoservers.com\/blog\/the-steps-of-the-cyber-kill-chain-and-what-is-it\/\" \/>\n<meta property=\"og:site_name\" content=\"Truxgo Server Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-31T02:06:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-31T02:06:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/10\/Kill-chain.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"620\" \/>\n\t<meta property=\"og:image:height\" content=\"413\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Truxgo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Truxgo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/the-steps-of-the-cyber-kill-chain-and-what-is-it\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/the-steps-of-the-cyber-kill-chain-and-what-is-it\\\/\"},\"author\":{\"name\":\"Truxgo\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/person\\\/8b409c26449db6aa09724b45331e333e\"},\"headline\":\"The steps of the Cyber Kill Chain and what is it?\",\"datePublished\":\"2020-10-31T02:06:49+00:00\",\"dateModified\":\"2020-10-31T02:06:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/the-steps-of-the-cyber-kill-chain-and-what-is-it\\\/\"},\"wordCount\":330,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/the-steps-of-the-cyber-kill-chain-and-what-is-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/Kill-chain.jpg\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/the-steps-of-the-cyber-kill-chain-and-what-is-it\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/the-steps-of-the-cyber-kill-chain-and-what-is-it\\\/\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/the-steps-of-the-cyber-kill-chain-and-what-is-it\\\/\",\"name\":\"The steps of the Cyber Kill Chain and what is it? - Truxgo Server Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/the-steps-of-the-cyber-kill-chain-and-what-is-it\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/the-steps-of-the-cyber-kill-chain-and-what-is-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/Kill-chain.jpg\",\"datePublished\":\"2020-10-31T02:06:49+00:00\",\"dateModified\":\"2020-10-31T02:06:51+00:00\",\"description\":\"Cyber Kill Chain would be a chain of steps that can be applied by both users and experts in this subject and will see this subject.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/the-steps-of-the-cyber-kill-chain-and-what-is-it\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/the-steps-of-the-cyber-kill-chain-and-what-is-it\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/the-steps-of-the-cyber-kill-chain-and-what-is-it\\\/#primaryimage\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/Kill-chain.jpg\",\"contentUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/Kill-chain.jpg\",\"width\":620,\"height\":413},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/the-steps-of-the-cyber-kill-chain-and-what-is-it\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The steps of the Cyber Kill Chain and what is it?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/\",\"name\":\"Truxgo Server Blog\",\"description\":\"Cloud Server and Hosting Tutorials.\",\"publisher\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#organization\",\"name\":\"Truxgo Server Blog\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/cropped-truxgo-logo-blanco.png\",\"contentUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/cropped-truxgo-logo-blanco.png\",\"width\":1250,\"height\":278,\"caption\":\"Truxgo Server Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/person\\\/8b409c26449db6aa09724b45331e333e\",\"name\":\"Truxgo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g\",\"caption\":\"Truxgo\"},\"sameAs\":[\"https:\\\/\\\/truxgoservers.com\\\/blog\"],\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/author\\\/truxgo\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The steps of the Cyber Kill Chain and what is it? - Truxgo Server Blog","description":"Cyber Kill Chain would be a chain of steps that can be applied by both users and experts in this subject and will see this subject.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/truxgoservers.com\/blog\/the-steps-of-the-cyber-kill-chain-and-what-is-it\/","og_locale":"es_MX","og_type":"article","og_title":"The steps of the Cyber Kill Chain and what is it? - Truxgo Server Blog","og_description":"Cyber Kill Chain would be a chain of steps that can be applied by both users and experts in this subject and will see this subject.","og_url":"https:\/\/truxgoservers.com\/blog\/the-steps-of-the-cyber-kill-chain-and-what-is-it\/","og_site_name":"Truxgo Server Blog","article_published_time":"2020-10-31T02:06:49+00:00","article_modified_time":"2020-10-31T02:06:51+00:00","og_image":[{"width":620,"height":413,"url":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/10\/Kill-chain.jpg","type":"image\/jpeg"}],"author":"Truxgo","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Truxgo","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/truxgoservers.com\/blog\/the-steps-of-the-cyber-kill-chain-and-what-is-it\/#article","isPartOf":{"@id":"https:\/\/truxgoservers.com\/blog\/the-steps-of-the-cyber-kill-chain-and-what-is-it\/"},"author":{"name":"Truxgo","@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/person\/8b409c26449db6aa09724b45331e333e"},"headline":"The steps of the Cyber Kill Chain and what is it?","datePublished":"2020-10-31T02:06:49+00:00","dateModified":"2020-10-31T02:06:51+00:00","mainEntityOfPage":{"@id":"https:\/\/truxgoservers.com\/blog\/the-steps-of-the-cyber-kill-chain-and-what-is-it\/"},"wordCount":330,"commentCount":1,"publisher":{"@id":"https:\/\/truxgoservers.com\/blog\/#organization"},"image":{"@id":"https:\/\/truxgoservers.com\/blog\/the-steps-of-the-cyber-kill-chain-and-what-is-it\/#primaryimage"},"thumbnailUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/10\/Kill-chain.jpg","keywords":["Cybersecurity"],"articleSection":["Cybersecurity"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/truxgoservers.com\/blog\/the-steps-of-the-cyber-kill-chain-and-what-is-it\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/truxgoservers.com\/blog\/the-steps-of-the-cyber-kill-chain-and-what-is-it\/","url":"https:\/\/truxgoservers.com\/blog\/the-steps-of-the-cyber-kill-chain-and-what-is-it\/","name":"The steps of the Cyber Kill Chain and what is it? - Truxgo Server Blog","isPartOf":{"@id":"https:\/\/truxgoservers.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/truxgoservers.com\/blog\/the-steps-of-the-cyber-kill-chain-and-what-is-it\/#primaryimage"},"image":{"@id":"https:\/\/truxgoservers.com\/blog\/the-steps-of-the-cyber-kill-chain-and-what-is-it\/#primaryimage"},"thumbnailUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/10\/Kill-chain.jpg","datePublished":"2020-10-31T02:06:49+00:00","dateModified":"2020-10-31T02:06:51+00:00","description":"Cyber Kill Chain would be a chain of steps that can be applied by both users and experts in this subject and will see this subject.","breadcrumb":{"@id":"https:\/\/truxgoservers.com\/blog\/the-steps-of-the-cyber-kill-chain-and-what-is-it\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/truxgoservers.com\/blog\/the-steps-of-the-cyber-kill-chain-and-what-is-it\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/truxgoservers.com\/blog\/the-steps-of-the-cyber-kill-chain-and-what-is-it\/#primaryimage","url":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/10\/Kill-chain.jpg","contentUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/10\/Kill-chain.jpg","width":620,"height":413},{"@type":"BreadcrumbList","@id":"https:\/\/truxgoservers.com\/blog\/the-steps-of-the-cyber-kill-chain-and-what-is-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/truxgoservers.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The steps of the Cyber Kill Chain and what is it?"}]},{"@type":"WebSite","@id":"https:\/\/truxgoservers.com\/blog\/#website","url":"https:\/\/truxgoservers.com\/blog\/","name":"Truxgo Server Blog","description":"Cloud Server and Hosting Tutorials.","publisher":{"@id":"https:\/\/truxgoservers.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/truxgoservers.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/truxgoservers.com\/blog\/#organization","name":"Truxgo Server Blog","url":"https:\/\/truxgoservers.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/08\/cropped-truxgo-logo-blanco.png","contentUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/08\/cropped-truxgo-logo-blanco.png","width":1250,"height":278,"caption":"Truxgo Server Blog"},"image":{"@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/person\/8b409c26449db6aa09724b45331e333e","name":"Truxgo","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g","caption":"Truxgo"},"sameAs":["https:\/\/truxgoservers.com\/blog"],"url":"https:\/\/truxgoservers.com\/blog\/author\/truxgo\/"}]}},"_links":{"self":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts\/1121","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/comments?post=1121"}],"version-history":[{"count":4,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts\/1121\/revisions"}],"predecessor-version":[{"id":1128,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts\/1121\/revisions\/1128"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/media\/1122"}],"wp:attachment":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/media?parent=1121"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/categories?post=1121"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/tags?post=1121"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}