notesum.ai
Published at December 5AI-based Attacker Models for Enhancing Multi-Stage Cyberattack Simulations in Smart Grids Using Co-Simulation Environments
cs.CR
Released Date: December 5, 2024
Authors: Omer Sen1, Christoph Pohl2, Immanuel Hacker1, Markus Stroot1, Andreas Ulbig1
Aff.: 1Fraunhofer FIT; 2RWTH Aachen University

| Step | Result | Depends on | |
|---|---|---|---|
| 1. | Get hostname | Hostname | |
| 2. | Check interfaces | Available networks | (1) |
| 3. | Scan network | Reachable targets | (2) |
| 4. | Generate SSH keys | SSH keys | |
| 5. | Brute-Force credentials | Compromised targets | (3),(4) |
| 6. | Connect agent to C2 server | (5) | |
| 7. | Remove SSH key |