A core function of the red team is adversary emulation. While not mandatory, it is commonly used to assess what a real adversary would do in an environment using their tools and methodologies. The red team can use various cyber kill chains to summarize and assess the steps and procedures of an engagement.

The blue team commonly uses cyber kill chains to map behaviors and break down an adversaries movement. The red team can adapt this idea to map adversary TTPs (Tactics,ย Techniques, andย Procedures) to components of an engagement.

Many regulation and standardization bodies have released their cyber kill chain. Each kill chain follows roughly the same structure, with some going more in-depth or defining objectives differently. Below is a small list of standard cyber kill chains.

In this room, we will commonly reference the โ€œLockheed Martin Cyber Kill Chain.โ€ It is a more standardized kill chain than others and is very commonly used among red and blue teams.

The Lockheed Martin kill chain focuses on a perimeter or external breach. Unlike other kill chains, it does not provide an in-depth breakdown of internal movement. You can think of this kill chain as a summary of all behaviors and operations present.

Components of the kill chain are broken down in the table below.

TechniquePurposeExamples
ReconnaissanceObtain information on the targetHarvesting emails, OSINT
WeaponizationCombine the objective with an exploit. Commonly results in a deliverable payload.Exploit with backdoor, malicious office document
DeliveryHow will the weaponized function be delivered to the targetEmail, web, USB
ExploitationExploit the targetโ€™s system to execute codeMS17-010, Zero-Logon, etc.
InstallationInstall malware or other toolingMimikatz, Rubeus, etc.
Command & ControlControl the compromised asset from a remote central controllerEmpire, Cobalt Strike, etc.
Actions on ObjectivesAny end objectives: ransomware, data exfiltration, etc.Conti, LockBit2.0, etc.