๊ธ€ ์ž‘์„ฑ์ž: heogi

1. Cyber Kill Chain ์ด๋ž€

Cyber Kill Chain์€ ๊ตฐ์—์„œ ์‚ฌ์šฉํ•˜๋˜ ์ ์˜ ํ™œ๋™์„ ์‹๋ณ„ํ•˜๊ณ  ์ €์ง€ํ•˜๋Š” ๋‹จ๊ณ„๋ณ„ ์ ‘๊ทผ ๋ฐฉ์‹์„ ์‚ฌ์ด๋ฒ„ ๊ณต๊ฒฉ์œผ๋กœ ํ•ด์„ํ•œ ๊ฐœ๋…์œผ๋กœ ์‚ฌ์ด๋ฒ„ ๊ณต๊ฒฉ์˜ ๋‹ค์–‘ํ•œ ๋‹จ๊ณ„์™€ ๋ณด์•ˆํŒ€์ด ๊ณต๊ฒฉ์ž๋ฅผ ํƒ์ง€ ๋ฐ ์ฐจ๋‹จํ•  ์ˆ˜ ์žˆ๋Š” ์ง€์ ์— ๋Œ€ํ•ด ์„ค๋ช…ํ•œ๋‹ค.

2. Cyber Kill Chain ๋‹จ๊ณ„

  1. Reconnaissance(์ •์ฐฐ)
    ๊ณต๊ฒฉ ๋ชฉํ‘œ๋ฅผ ์„ ์ • ๋ฐ ๋ถ„์„ํ•˜๋Š” ๋‹จ๊ณ„์ด๋‹ค. ๊ณต๊ฒฉ ๋ชฉํ‘œ๊ฐ€ ์„ ์ •๋˜๋ฉด ๋ชฉํ‘œ์— ๋Œ€ํ•œ ์ •๋ณด๋ฅผ ์ˆ˜์ง‘ํ•œ๋‹ค.
    ์›น ํฌ๋กค๋ง, ์‚ฌํšŒ ๊ณตํ•™ ๊ธฐ๋ฒ•, ๊ตฌ์ธ ๊ณต๊ณ ์˜ ๊ธฐ์ˆ  ์Šคํƒ, ์‚ฌ์šฉํ•˜๋Š” ๋ฐฑ์‹  ๋ฐ EDR , IP ๋Œ€์—ญ ๋ฐ ์—ด๋ฆฐ Port ๋“ฑ ๋‹ค์–‘ํ•œ ์ •๋ณด๋ฅผ ์ˆ˜์ง‘ํ•˜์—ฌ ์•ž์œผ๋กœ ์ง„ํ–‰๋  ๋‹จ๊ณ„์— ํ™œ์šฉํ•œ๋‹ค.

  2. Weaponization(๋ฌด๊ธฐํ™”)
    ์ดˆ๊ธฐ ์•ก์„ธ์Šค์— ์‚ฌ์šฉ๋  ์•…์„ฑ์ฝ”๋“œ๊ฐ€ ๊ฐœ๋ฐœ๋˜์–ด ์ผ๋ถ€ ์œ ํ˜•์˜ ์ต์Šคํ”Œ๋กœ์ž‡ ๋˜๋Š” ์ „๋‹ฌ ๊ฐ€๋Šฅํ•œ ํŽ˜์ด๋กœ๋“œ๊ฐ€ ์ž‘์„ฑ๋˜๋Š” ๋‹จ๊ณ„์ด๋‹ค.

  3. Delivery(์ „๋‹ฌ)
    ์ต์Šคํ”Œ๋กœ์ž‡ ๋˜๋Š” ํŽ˜์ด๋กœ๋“œ๊ฐ€ ๊ณต๊ฒฉ ๋ชฉํ‘œ์— ์ „๋‹ฌ๋˜๋Š” ๋‹จ๊ณ„.
    ์•ž์„œ ์ˆ˜์ง‘ํ•œ ์ •๋ณด๋ฅผ ํ† ๋Œ€๋กœ ํ”ผ์‹ฑ, ์Šค๋ฏธ์‹ฑ, ์•…์„ฑ ์›น์‚ฌ์ดํŠธ๋กœ์˜ ์ ‘์†์„ ์œ ๋„ํ•˜์—ฌ ๋ฌด๊ธฐํ™”๋œ ์•…์„ฑ์ฝ”๋“œ๋‚˜ ํŽ˜์ด๋กœ๋“œ๋ฅผ ์ „๋‹ฌ ํ•˜๋Š” ๋‹จ๊ณ„์ด๋‹ค.

  4. Exploit(์ต์Šคํ”Œ๋กœ์ž‡)
    ์ „๋‹ฌ๋œ ์•…์„ฑ์ฝ”๋“œ, ํŽ˜์ด๋กœ๋“œ๊ฐ€ ํŠธ๋ฆฌ๊ฑฐ๋˜๋Š” ๋‹จ๊ณ„์ด๋‹ค.

  5. Install(์„ค์น˜)
    ๊ณต๊ฒฉ ๋ชฉํ‘œ์— ์•…์„ฑ์ฝ”๋“œ๊ฐ€ ์„ค์น˜๋˜์–ด ์‹คํ–‰๋˜๋Š” ๋‹จ๊ณ„์ด๋‹ค.

  6. C&C(๋ช…๋ น ๋ฐ ์ œ์–ด)
    ๊ณต๊ฒฉ ๋ชฉํ‘œ์— ์„ค์น˜๋œ ์•…์„ฑ์ฝ”๋“œ๊ฐ€ C&C ์„œ๋ฒ„๋ฅผ ํ†ตํ•ด ๋ช…๋ น์„ ์ˆ˜ํ–‰ํ•˜๊ณ  ๊ณต๊ฒฉ ๋ชฉํ‘œ๋ฅผ ์ œ์–ดํ•˜๋Š” ๋‹จ๊ณ„์ด๋‹ค.

  7. Action(ํ–‰๋™ ๊ฐœ์‹œ)
    ๋‚ด๋ถ€ ์‹œ์Šคํ…œ์˜ ๊ธฐ๋ฐ€ ์ •๋ณด ์ˆ˜์ง‘ ๋ฐ ์‹œ์Šคํ…œ ํŒŒ๊ดด ๋“ฑ์˜ ๊ณต๊ฒฉ ์ˆ˜ํ–‰ ๋‹จ๊ณ„์ด๋‹ค.

3. ๋‹จ๊ณ„๋ณ„ ํƒ์ง€ ๋ฐ ๋Œ€์‘ ๋ฐฉ์•ˆ

 

์•„๋ž˜๋Š” ๊ฐ ๋‹จ๊ณ„๋ณ„ ๋Œ€์‘ ๋ฐฉ์•ˆ์ด๋‹ค.

๋‹จ๊ณ„ ๊ณต๊ฒฉ ๋ฐฉ๋ฒ• ๋Œ€์‘ ๋ฐฉ์•ˆ
Reconnaissance - ์ด๋ฉ”์ผ, ํฌ๋กค๋ง
- ์‚ฌํšŒ๊ณตํ•™๊ธฐ๋ฒ•
- IPS, FireWall, HoneyPot, Bastion Host
Weaponization - ์•…์„ฑ์ฝ”๋“œ ๋ฐ ํŽ˜์ด๋กœ๋“œ ์ƒ์„ฑ
- Trojan ๋“ฑ ๊ฒฐํ•ฉ
- IPS/IDS
- Threat Intelligence
Delivery - Drive By Download
- Spear Phising
- Anti Spam
- URL Filtering
Exploitation - ์•…์„ฑ์ฝ”๋“œ ๋ฐ ํŽ˜์ด๋กœ๋“œ ์‹คํ–‰
- ์ทจ์•ฝ์  ์ด์šฉ ๊ณต๊ฒฉ
- Endpoint Security(Anti Virus, HIDS)
- PMS(3rd Party, OS Patch)
Installation - Trojan, Backdoor์„ค์น˜|
- Lateral Movement
- Endpoint Security(Anti Virus, HIDS)
- SIEM Monitoring
Commnad & Control - ์‹œ์Šคํ…œ ๊ถŒํ•œ ํš๋“
- ๋ช…๋ น์–ด ์ „๋‹ฌ/์ œ์–ด
- IPS/IDS, FireWall
- SIEM Monitoring
Actions - ์‹œ์Šคํ…œ ๊ธฐ๋ฐ€ ์ •๋ณด ์ˆ˜์ง‘
- ์‹œ์Šคํ…œ ํŒŒ๊ดด
- DLP
- IPS/IDS, FireWall

 

 

์ฐธ์กฐ 

https://blog.skby.net/%EC%82%AC%EC%9D%B4%EB%B2%84-%ED%82%AC-%EC%B2%B4%EC%9D%B8-cyber-kill-chain/

 

์‚ฌ์ด๋ฒ„ ํ‚ฌ ์ฒด์ธ (Cyber Kill Chain) > ๋„๋ฆฌ์˜ ๋””์ง€ํ„ธ๋ผ์ดํ”„

I. ์‚ฌ์ด๋ฒ„ ๊ณต๊ฒฉ ๋ถ„์„ ๋ชจ๋ธ, ์‚ฌ์ด๋ฒ„ ํ‚ฌ ์ฒด์ธ ๊ฐ€. ์‚ฌ์ด๋ฒ„ ํ‚ฌ ์ฒด์ธ์˜ ๊ฐœ๋… ์‚ฌ์ด๋ฒ„ ๊ณต๊ฒฉ์„ ํ”„๋กœ์„ธ์Šค ๊ธฐ๋ฐ˜ ๋ถ„์„ํ•˜์—ฌ ๊ฐ ๋‹จ๊ณ„ ๋ณ„ ์œ„ํ˜‘ ์š”์†Œ ํŒŒ์•… ๋ฐ ๊ณต๊ฒฉ ๋ฐฉ๋ฒ• ์ •์˜ ๋ถ„์„ ๋ชจ๋ธ ๋‚˜. ์‚ฌ์ด๋ฒ„ ํ‚ฌ ์ฒด์ธ์˜ ์‚ฌ์ƒ

blog.skby.net

 

https://www.itworld.co.kr/news/100774

 

ITWorld ์šฉ์–ดํ’€์ด | ์‚ฌ์ด๋ฒ„ ํ‚ฌ ์ฒด์ธ(Cyber Kill Chain)

์‚ฌ์ด๋ฒ„๋ณด์•ˆ ์„ธ๊ณ„์—์„œ๋Š” ๋šซ๋ฆฌ์ง€ ์•Š๋Š” ๋ฐฉํŒจ๋Š” ์—†๋‹ค๋Š” ๊ฒƒ์ด ์ด์ œ ์ •์„ค์ด ๋˜์—ˆ์Šต๋‹ˆ๋‹ค. ๊ณต๊ฒฉ์ž๊ฐ€ ์ถฉ๋ถ„ํ•œ ์‹œ๊ฐ„๊ณผ ์ž์›์„ ๊ฐ–๊ณ  ๊พธ์ค€ํžˆ ๊ณต๊ฒฉํ•œ๋‹ค๋ฉด ๋šซ์ง€ ๋ชปํ• 

www.itworld.co.kr

 

https://www.igloo.co.kr/security-information/%EC%82%AC%EC%9D%B4%EB%B2%84%ED%82%AC%EC%B2%B4%EC%9D%B8cyber-kill-chain%EB%AA%A8%EB%8D%B8%EC%9D%84-%ED%86%B5%ED%95%9C-siem%EC%9D%98-%ED%99%9C%EC%9A%A9/

 

์‚ฌ์ด๋ฒ„ํ‚ฌ์ฒด์ธ(Cyber Kill Chain)๋ชจ๋ธ์„ ํ†ตํ•œ SIEM์˜ ํ™œ์šฉ

  ์ด๊ธ€๋ฃจ์‹œํ๋ฆฌํ‹ฐ PSํŒ€ ํ™ฉ๋ฒ”์„ ๋ถ€์žฅ(bumseokjr@igloosec.com)     ์ตœ๊ทผ ๋ถํ•œ์ด 6์ฐจ ํ•ต์‹คํ—˜์„ ๋‹จํ–‰ํ•จ์— ๋”ฐ๋ผ ์‚ฌ๋“œ, ICBM๋“ฑ์˜ ๊ตฐ์‚ฌ ์šฉ์–ด๊ฐ€ ๋‰ด์Šค๋‚˜ ํฌํ„ธ ์‚ฌ์ดํŠธ ์‹ค์‹œ๊ฐ„ ๊ฒ€์ƒ‰์„ ํ†ตํ•ด ๋งŽ์ด ์•Œ๋ ค์ง€๊ณ  ์žˆ๋‹ค. ์‚ฌ

www.igloo.co.kr

 

https://www.crowdstrike.com/cybersecurity-101/cyber-kill-chain/

 

What is the Cyber Kill Chain? Introduction Guide - CrowdStrike

The cyber kill chain is an adaptation of the military’s kill chain, a step-by-step approach that identifies and stops enemy activity. Learn more here!

www.crowdstrike.com

https://academy.hackthebox.com/module/148/section/1363

'๐ŸชฌIncident Respose' ์นดํ…Œ๊ณ ๋ฆฌ์˜ ๋‹ค๋ฅธ ๊ธ€

Threat Modelling  (0) 2023.12.06
STRIDE Framework  (0) 2023.11.23
๋ณด์•ˆ ๋™ํ–ฅ ์ฐธ๊ณ  ์‚ฌ์ดํŠธ  (0) 2023.10.15
MITRE ATT&CK  (0) 2023.08.20