The cyber attack lifecycle attempts to describe the attack process of adversaries in stages.

  • Reconnaissance
  • Weaponization
  • Delivery
  • Exploitation
  • Installation
  • Command & Control