At what cyber kill chain stage do attackers use malware to exploit specific software or hardware vulnerabilities on the target, based on the information retrieved at the reconnaissance stage?

At what cyber kill chain stage do attackers use malware to exploit specific software or hardware vulnerabilities on the target, based on the information retrieved at the reconnaissance stage?
A . Installation
B . Reconnaissance
C . Weaponization
D . Delivery

Answer: C

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments