Attack Patterns
Reconnaissance |
Weaponization |
Delivery |
Exploitation |
Installation |
Command & Control |
Action on Objectives |
First Stage
You have been targeted
You have valuables of interest
Your weaknesses are being exposed
Attacker has targeted your organizati on and is using public informati on to learning about your valuables and weaknesses.