mirror of
https://github.com/aljazceru/securedorg.github.io.git
synced 2025-12-23 17:04:27 +01:00
updating malware page
This commit is contained in:
@@ -7,6 +7,8 @@ title: Malware Techniques
|
||||
|
||||
# Section 2.1: Malware Techniques #
|
||||
|
||||
The malware classes may exhibit one or more of the following techniques. [Mitre Att&ck](https://attack.mitre.org/wiki/Main_Page) framework provides a great reference for many of these techniques.
|
||||
|
||||
## Techniques Overview
|
||||
* [Compression](#compression)
|
||||
* [Obfuscation](#obfuscation)
|
||||
@@ -86,6 +88,10 @@ title: Malware Techniques
|
||||
|
||||

|
||||
|
||||
Example: Dll Search Order Hijacking
|
||||

|
||||
|
||||
|
||||
### Example Malware
|
||||
|
||||
| Name | Hash | Link |
|
||||
@@ -111,9 +117,6 @@ title: Malware Techniques
|
||||
* Credential Theft
|
||||
* UAC Bypasses
|
||||
|
||||
Example: Dll Search Order Hijacking
|
||||

|
||||
|
||||
[Goto Top^](#techniques-overview)
|
||||
|
||||
---
|
||||
|
||||
Reference in New Issue
Block a user