mirror of
https://github.com/aljazceru/securedorg.github.io.git
synced 2025-12-21 07:54:20 +01:00
fixing tables
This commit is contained in:
46
malware.md
46
malware.md
@@ -14,18 +14,18 @@ title: Malware Techniques
|
||||
|  |  |  |  |  |  |
|
||||
|
||||
## Techniques Overview
|
||||
* [##Compression](#compression)
|
||||
* [##Obfuscation](#obfuscation)
|
||||
* [##Persistence](#persistence)
|
||||
* [##Privilege Escalation](#privilege-escalation)
|
||||
* [##Defense Evasion](#defense-evasion)
|
||||
* [##Credential Theft](#credential-theft)
|
||||
* [##Reconnaissance](#recon)
|
||||
* [##Lateral Movement](#lateral-movement)
|
||||
* [##Execution](#execution)
|
||||
* [##Collection](#collection)
|
||||
* [##Exfiltration](#exfiltration)
|
||||
* [##Command and Control](#command-and-control)
|
||||
* [Compression](#compression)
|
||||
* [Obfuscation](#obfuscation)
|
||||
* [Persistence](#persistence)
|
||||
* [Privilege Escalation](#privilege-escalation)
|
||||
* [Defense Evasion](#defense-evasion)
|
||||
* [Credential Theft](#credential-theft)
|
||||
* [Reconnaissance](#recon)
|
||||
* [Lateral Movement](#lateral-movement)
|
||||
* [Execution](#execution)
|
||||
* [Collection](#collection)
|
||||
* [Exfiltration](#exfiltration)
|
||||
* [Command and Control](#command-and-control)
|
||||
|
||||
---
|
||||
|
||||
@@ -74,6 +74,8 @@ title: Malware Techniques
|
||||
|
||||

|
||||
|
||||
[Goto Top^](#techniques-overview)
|
||||
|
||||
---
|
||||
|
||||
## Persistence
|
||||
@@ -83,6 +85,8 @@ title: Malware Techniques
|
||||
|
||||

|
||||
|
||||
[Goto Top^](#techniques-overview)
|
||||
|
||||
---
|
||||
|
||||
## Privilege Escalation
|
||||
@@ -102,6 +106,8 @@ title: Malware Techniques
|
||||
Example: Dll Search Order Hijacking
|
||||

|
||||
|
||||
[Goto Top^](#techniques-overview)
|
||||
|
||||
---
|
||||
|
||||
|
||||
@@ -116,6 +122,8 @@ Example: Dll Search Order Hijacking
|
||||
* Masquerading
|
||||
* Process Hallowing
|
||||
|
||||
[Goto Top^](#techniques-overview)
|
||||
|
||||
---
|
||||
|
||||
## Credential Theft
|
||||
@@ -127,18 +135,24 @@ Example: Dll Search Order Hijacking
|
||||
Example: Mimikatz credential theft
|
||||

|
||||
|
||||
[Goto Top^](#techniques-overview)
|
||||
|
||||
---
|
||||
|
||||
## Reconnaissance
|
||||
|
||||
* Gain knowledge about the system and internal network.
|
||||
|
||||
[Goto Top^](#techniques-overview)
|
||||
|
||||
---
|
||||
|
||||
## Lateral Movement
|
||||
|
||||
* Enable an adversary to access and control remote systems on a network and could
|
||||
|
||||
[Goto Top^](#techniques-overview)
|
||||
|
||||
---
|
||||
|
||||
## Execution
|
||||
@@ -147,6 +161,8 @@ Example: Mimikatz credential theft
|
||||
* scripts
|
||||
* post-exploitation
|
||||
|
||||
[Goto Top^](#techniques-overview)
|
||||
|
||||
---
|
||||
|
||||
|
||||
@@ -154,6 +170,8 @@ Example: Mimikatz credential theft
|
||||
|
||||
* Identify and gather information, such as sensitive files, from a target network prior to exfiltration
|
||||
|
||||
[Goto Top^](#techniques-overview)
|
||||
|
||||
---
|
||||
|
||||
|
||||
@@ -161,6 +179,8 @@ Example: Mimikatz credential theft
|
||||
|
||||
* Removing files and information
|
||||
|
||||
[Goto Top^](#techniques-overview)
|
||||
|
||||
---
|
||||
|
||||
|
||||
@@ -168,4 +188,6 @@ Example: Mimikatz credential theft
|
||||
|
||||
* Communicate with systems under their control
|
||||
|
||||
[Goto Top^](#techniques-overview)
|
||||
|
||||
[x86 Assembly <- Back](https://securedorg.github.io/RE101/section1.3) | [Next -> Section 3](https://securedorg.github.io/RE101/section3)
|
||||
|
||||
Reference in New Issue
Block a user