mirror of
https://github.com/aljazceru/securedorg.github.io.git
synced 2025-12-21 16:04:20 +01:00
fixing tables
This commit is contained in:
46
malware.md
46
malware.md
@@ -14,18 +14,18 @@ title: Malware Techniques
|
|||||||
|  |  |  |  |  |  |
|
|  |  |  |  |  |  |
|
||||||
|
|
||||||
## Techniques Overview
|
## Techniques Overview
|
||||||
* [##Compression](#compression)
|
* [Compression](#compression)
|
||||||
* [##Obfuscation](#obfuscation)
|
* [Obfuscation](#obfuscation)
|
||||||
* [##Persistence](#persistence)
|
* [Persistence](#persistence)
|
||||||
* [##Privilege Escalation](#privilege-escalation)
|
* [Privilege Escalation](#privilege-escalation)
|
||||||
* [##Defense Evasion](#defense-evasion)
|
* [Defense Evasion](#defense-evasion)
|
||||||
* [##Credential Theft](#credential-theft)
|
* [Credential Theft](#credential-theft)
|
||||||
* [##Reconnaissance](#recon)
|
* [Reconnaissance](#recon)
|
||||||
* [##Lateral Movement](#lateral-movement)
|
* [Lateral Movement](#lateral-movement)
|
||||||
* [##Execution](#execution)
|
* [Execution](#execution)
|
||||||
* [##Collection](#collection)
|
* [Collection](#collection)
|
||||||
* [##Exfiltration](#exfiltration)
|
* [Exfiltration](#exfiltration)
|
||||||
* [##Command and Control](#command-and-control)
|
* [Command and Control](#command-and-control)
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
@@ -74,6 +74,8 @@ title: Malware Techniques
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
[Goto Top^](#techniques-overview)
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
## Persistence
|
## Persistence
|
||||||
@@ -83,6 +85,8 @@ title: Malware Techniques
|
|||||||
|
|
||||||

|

|
||||||
|
|
||||||
|
[Goto Top^](#techniques-overview)
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
## Privilege Escalation
|
## Privilege Escalation
|
||||||
@@ -102,6 +106,8 @@ title: Malware Techniques
|
|||||||
Example: Dll Search Order Hijacking
|
Example: Dll Search Order Hijacking
|
||||||

|

|
||||||
|
|
||||||
|
[Goto Top^](#techniques-overview)
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|
||||||
@@ -116,6 +122,8 @@ Example: Dll Search Order Hijacking
|
|||||||
* Masquerading
|
* Masquerading
|
||||||
* Process Hallowing
|
* Process Hallowing
|
||||||
|
|
||||||
|
[Goto Top^](#techniques-overview)
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
## Credential Theft
|
## Credential Theft
|
||||||
@@ -127,18 +135,24 @@ Example: Dll Search Order Hijacking
|
|||||||
Example: Mimikatz credential theft
|
Example: Mimikatz credential theft
|
||||||

|

|
||||||
|
|
||||||
|
[Goto Top^](#techniques-overview)
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
## Reconnaissance
|
## Reconnaissance
|
||||||
|
|
||||||
* Gain knowledge about the system and internal network.
|
* Gain knowledge about the system and internal network.
|
||||||
|
|
||||||
|
[Goto Top^](#techniques-overview)
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
## Lateral Movement
|
## Lateral Movement
|
||||||
|
|
||||||
* Enable an adversary to access and control remote systems on a network and could
|
* Enable an adversary to access and control remote systems on a network and could
|
||||||
|
|
||||||
|
[Goto Top^](#techniques-overview)
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
## Execution
|
## Execution
|
||||||
@@ -147,6 +161,8 @@ Example: Mimikatz credential theft
|
|||||||
* scripts
|
* scripts
|
||||||
* post-exploitation
|
* post-exploitation
|
||||||
|
|
||||||
|
[Goto Top^](#techniques-overview)
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|
||||||
@@ -154,6 +170,8 @@ Example: Mimikatz credential theft
|
|||||||
|
|
||||||
* Identify and gather information, such as sensitive files, from a target network prior to exfiltration
|
* Identify and gather information, such as sensitive files, from a target network prior to exfiltration
|
||||||
|
|
||||||
|
[Goto Top^](#techniques-overview)
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|
||||||
@@ -161,6 +179,8 @@ Example: Mimikatz credential theft
|
|||||||
|
|
||||||
* Removing files and information
|
* Removing files and information
|
||||||
|
|
||||||
|
[Goto Top^](#techniques-overview)
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|
||||||
@@ -168,4 +188,6 @@ Example: Mimikatz credential theft
|
|||||||
|
|
||||||
* Communicate with systems under their control
|
* Communicate with systems under their control
|
||||||
|
|
||||||
|
[Goto Top^](#techniques-overview)
|
||||||
|
|
||||||
[x86 Assembly <- Back](https://securedorg.github.io/RE101/section1.3) | [Next -> Section 3](https://securedorg.github.io/RE101/section3)
|
[x86 Assembly <- Back](https://securedorg.github.io/RE101/section1.3) | [Next -> Section 3](https://securedorg.github.io/RE101/section3)
|
||||||
|
|||||||
Reference in New Issue
Block a user