In the Lockheed Martin Cyber Kill Chain Methodology, the phase where an adversary creates a deliverable malicious payload using an exploit and a backdoor is known as the Weaponization phase. This is the second stage of the Cyber Kill Chain, which occurs after the initial Reconnaissance phase. During Weaponization, the attacker prepares a malicious payload that is designed to exploit vulnerabilities in the target system. This payload often includes a backdoor to allow for persistent access to the compromised system.
The Weaponization phase involves the creation of malware tailored to the target's specific vulnerabilities discovered during Reconnaissance. The attacker uses this malware to create a weaponized deliverable, which can be transmitted to the target during the subsequent Delivery phase of the Cyber Kill Chain.
References: The EC-Council SOC Analyst course materials and study guides discuss the Cyber Kill Chain Methodology in detail, including the Weaponization phase. These resources are designed to provide SOC Analysts with the knowledge and skills necessary to identify, analyze, and respond to cyber threats effectively.
For further information, please refer to the official EC-Council Certified SOC Analyst (CSA) study guides and related course materials. Additionally, Lockheed Martin provides resources and an overview of the Cyber Kill Chain on their official website12.
