fixing tables

This commit is contained in:
Amanda Rousseau
2017-03-20 14:44:12 -07:00
parent d30d5db46d
commit 676bf7ea22

View File

@@ -14,18 +14,18 @@ title: Malware Techniques
| ![alt text](https://securedorg.github.io/images/rightarrow.png) | ![alt text](https://securedorg.github.io/images/rightarrow.png) | ![alt text](https://securedorg.github.io/images/rightarrow.png) | ![alt text](https://securedorg.github.io/images/rightarrow.png) | ![alt text](https://securedorg.github.io/images/rightarrow.png) | ![alt text](https://securedorg.github.io/images/rightarrow.png) | | ![alt text](https://securedorg.github.io/images/rightarrow.png) | ![alt text](https://securedorg.github.io/images/rightarrow.png) | ![alt text](https://securedorg.github.io/images/rightarrow.png) | ![alt text](https://securedorg.github.io/images/rightarrow.png) | ![alt text](https://securedorg.github.io/images/rightarrow.png) | ![alt text](https://securedorg.github.io/images/rightarrow.png) |
## Techniques Overview ## Techniques Overview
* [##Compression](#compression) * [Compression](#compression)
* [##Obfuscation](#obfuscation) * [Obfuscation](#obfuscation)
* [##Persistence](#persistence) * [Persistence](#persistence)
* [##Privilege Escalation](#privilege-escalation) * [Privilege Escalation](#privilege-escalation)
* [##Defense Evasion](#defense-evasion) * [Defense Evasion](#defense-evasion)
* [##Credential Theft](#credential-theft) * [Credential Theft](#credential-theft)
* [##Reconnaissance](#recon) * [Reconnaissance](#recon)
* [##Lateral Movement](#lateral-movement) * [Lateral Movement](#lateral-movement)
* [##Execution](#execution) * [Execution](#execution)
* [##Collection](#collection) * [Collection](#collection)
* [##Exfiltration](#exfiltration) * [Exfiltration](#exfiltration)
* [##Command and Control](#command-and-control) * [Command and Control](#command-and-control)
--- ---
@@ -74,6 +74,8 @@ title: Malware Techniques
![alt text](https://securedorg.github.io/images/CodeObfuscation.gif "CodeObfuscation") ![alt text](https://securedorg.github.io/images/CodeObfuscation.gif "CodeObfuscation")
[Goto Top^](#techniques-overview)
--- ---
## Persistence ## Persistence
@@ -83,6 +85,8 @@ title: Malware Techniques
![alt text](https://securedorg.github.io/images/Persistence.png "Persistence") ![alt text](https://securedorg.github.io/images/Persistence.png "Persistence")
[Goto Top^](#techniques-overview)
--- ---
## Privilege Escalation ## Privilege Escalation
@@ -102,6 +106,8 @@ title: Malware Techniques
Example: Dll Search Order Hijacking Example: Dll Search Order Hijacking
![alt text](https://securedorg.github.io/images/DLLload.gif "Dll loading") ![alt text](https://securedorg.github.io/images/DLLload.gif "Dll loading")
[Goto Top^](#techniques-overview)
--- ---
@@ -116,6 +122,8 @@ Example: Dll Search Order Hijacking
* Masquerading * Masquerading
* Process Hallowing * Process Hallowing
[Goto Top^](#techniques-overview)
--- ---
## Credential Theft ## Credential Theft
@@ -127,18 +135,24 @@ Example: Dll Search Order Hijacking
Example: Mimikatz credential theft Example: Mimikatz credential theft
![alt text](https://securedorg.github.io/images/mimikatzElevate.png "Mimkatz Elevating") ![alt text](https://securedorg.github.io/images/mimikatzElevate.png "Mimkatz Elevating")
[Goto Top^](#techniques-overview)
--- ---
## Reconnaissance ## Reconnaissance
* Gain knowledge about the system and internal network. * Gain knowledge about the system and internal network.
[Goto Top^](#techniques-overview)
--- ---
## Lateral Movement ## Lateral Movement
* Enable an adversary to access and control remote systems on a network and could * Enable an adversary to access and control remote systems on a network and could
[Goto Top^](#techniques-overview)
--- ---
## Execution ## Execution
@@ -147,6 +161,8 @@ Example: Mimikatz credential theft
* scripts * scripts
* post-exploitation * post-exploitation
[Goto Top^](#techniques-overview)
--- ---
@@ -154,6 +170,8 @@ Example: Mimikatz credential theft
* Identify and gather information, such as sensitive files, from a target network prior to exfiltration * Identify and gather information, such as sensitive files, from a target network prior to exfiltration
[Goto Top^](#techniques-overview)
--- ---
@@ -161,6 +179,8 @@ Example: Mimikatz credential theft
* Removing files and information * Removing files and information
[Goto Top^](#techniques-overview)
--- ---
@@ -168,4 +188,6 @@ Example: Mimikatz credential theft
* Communicate with systems under their control * Communicate with systems under their control
[Goto Top^](#techniques-overview)
[x86 Assembly <- Back](https://securedorg.github.io/RE101/section1.3) | [Next -> Section 3](https://securedorg.github.io/RE101/section3) [x86 Assembly <- Back](https://securedorg.github.io/RE101/section1.3) | [Next -> Section 3](https://securedorg.github.io/RE101/section3)