mirror of
https://github.com/aljazceru/securedorg.github.io.git
synced 2025-12-21 16:04:20 +01:00
updating malware techniques
This commit is contained in:
40
malware.md
40
malware.md
@@ -6,3 +6,43 @@ title: Malware Techniques
|
|||||||
[Go Back to Reverse Engineering Malware 101](https://securedorg.github.io/RE101/)
|
[Go Back to Reverse Engineering Malware 101](https://securedorg.github.io/RE101/)
|
||||||
|
|
||||||
# Section 2: Malware Techniques #
|
# Section 2: Malware Techniques #
|
||||||
|
|
||||||
|
## Typical Attack Flow ##
|
||||||
|
|
||||||
|
## Techniques Overview ##
|
||||||
|
* [Compression](#compression)
|
||||||
|
* [Obfuscation](#obfuscation)
|
||||||
|
* [Persistence](#persistence)
|
||||||
|
* [Privilege Escalation](#privilege-escalation)
|
||||||
|
* [Defense Evasion & Clean up](#defense-evasion)
|
||||||
|
* [Credential Theft](#cred-theft)
|
||||||
|
* [Reconnaissance](#recon)
|
||||||
|
* [Lateral Movement](#lateral-movement)
|
||||||
|
* [Execution](#execution)
|
||||||
|
* [Collection](#collection)
|
||||||
|
* [Exfiltration](#exfiltration)
|
||||||
|
* [Command and Control](#c-and-c)
|
||||||
|
|
||||||
|
## Obfuscation
|
||||||
|
|
||||||
|
## Persistence
|
||||||
|
|
||||||
|
## Privilege Escalation
|
||||||
|
|
||||||
|
## Defense Evasion & Clean up
|
||||||
|
|
||||||
|
## Credential Theft
|
||||||
|
|
||||||
|
## Reconnaissance
|
||||||
|
|
||||||
|
## Lateral Movement
|
||||||
|
|
||||||
|
## Execution
|
||||||
|
|
||||||
|
## Collection
|
||||||
|
|
||||||
|
## Exfiltration
|
||||||
|
|
||||||
|
## Command and Control
|
||||||
|
|
||||||
|
[x86 Assembly <- Back](https://securedorg.github.io/RE101/section1.3) | [Next -> Section 3](https://securedorg.github.io/RE101/section3)
|
||||||
|
|||||||
Reference in New Issue
Block a user