
The Attack Chain: Breaking Traditional Boundaries
The attack chain today frequently consists of three steps:- Perimeter Hacking: The attacker exploits asset vulnerabilities via drive-by downloads, phishing, direct hacking, etc.
- Privilege Hacking and Escalation: The attacker highjacks privileges via exploits and phishing, or leverages stolen/cracked passwords.
- Lateral Movement & Exfiltration: The attacker leverages privileges, passwords and exploits to compromise other resources.