mirror of
https://github.com/aljazceru/securedorg.github.io.git
synced 2025-12-23 17:04:27 +01:00
updating malware page
This commit is contained in:
@@ -7,6 +7,8 @@ title: Malware Techniques
|
|||||||
|
|
||||||
# Section 2.1: Malware Techniques #
|
# Section 2.1: Malware Techniques #
|
||||||
|
|
||||||
|
The malware classes may exhibit one or more of the following techniques. [Mitre Att&ck](https://attack.mitre.org/wiki/Main_Page) framework provides a great reference for many of these techniques.
|
||||||
|
|
||||||
## Techniques Overview
|
## Techniques Overview
|
||||||
* [Compression](#compression)
|
* [Compression](#compression)
|
||||||
* [Obfuscation](#obfuscation)
|
* [Obfuscation](#obfuscation)
|
||||||
@@ -86,6 +88,10 @@ title: Malware Techniques
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
Example: Dll Search Order Hijacking
|
||||||
|

|
||||||
|
|
||||||
|
|
||||||
### Example Malware
|
### Example Malware
|
||||||
|
|
||||||
| Name | Hash | Link |
|
| Name | Hash | Link |
|
||||||
@@ -111,9 +117,6 @@ title: Malware Techniques
|
|||||||
* Credential Theft
|
* Credential Theft
|
||||||
* UAC Bypasses
|
* UAC Bypasses
|
||||||
|
|
||||||
Example: Dll Search Order Hijacking
|
|
||||||

|
|
||||||
|
|
||||||
[Goto Top^](#techniques-overview)
|
[Goto Top^](#techniques-overview)
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|||||||
Reference in New Issue
Block a user