hiexam
eccouncil · 312-50v12 · Q425 · multiple_choice · topic_1

You are a penetration tester working to test the user awareness of the employees of the client XYZ. You harvested two e…

You are a penetration tester working to test the user awareness of the employees of the client XYZ. You harvested two employees’ emails from some public sources and are creating a client-side backdoor to send it to the employees via email. Which stage of the cyber kill chain are you at?
  • A.Reconnaissance
  • B.Weaponization
  • C.Command and control
  • D.Exploitation
Explanation
Selected Answer: B B. Weaponization The cyber kill chain is a framework that describes the different stages of a cyber attack. The stages of the kill chain are as follows: Reconnaissance Weaponization Delivery Exploitation Installation Command and Control Actions on Objectives In this scenario, the penetration tester has already completed the first stage of reconnaissance by harvesting the employees' email addresses from public sources. They are now in the second stage of weaponization, where they are creating a client-side backdoor and attaching it to an email in order to deliver it to the employees. The next stages of the kill chain would be delivery, where the email is sent to the employees, followed by exploitation, installation, and command and control, where the attacker gains access to the target system and establishes a channel for ongoing communication.

Reference: examtopics_top_comment

Practice with progress tracking

Sign in to track wrong answers, get spaced-repetition reminders, and run timed exam mode.