Research Article
Enhanced Android App-Repackaging Attack on In-Vehicle Network
Table 2
Cyber Kill Chain phases and characteristics.
| Phase | Action |
| Reconnaissance | Identify the target | Weaponization | Prepare the operation | Delivery | Launch the operation | Exploitation | Gain access to victim | Installation | Establish beachhead at the victim | Command and Control | Remotely control the implants | Actions on Objectives | Achieve the mission’s goal |
|
|