--- layout: default permalink: /RE101/section2/ title: Malware Techniques --- [Go Back to Reverse Engineering Malware 101](https://securedorg.github.io/RE101/) # Section 2: Malware Techniques # ## Typical Attack Flow ## | Perimeter Recon | Infiltrate | Internal Recon | Entrench | Exfiltrate | Purge | | ------------ |:------------:|:------------:|:------------:|:------------:|:------------:| | ![alt text](https://securedorg.github.io/images/rightarrow.png) | ![alt text](https://securedorg.github.io/images/rightarrow.png) | ![alt text](https://securedorg.github.io/images/rightarrow.png) | ![alt text](https://securedorg.github.io/images/rightarrow.png) | ![alt text](https://securedorg.github.io/images/rightarrow.png) | ![alt text](https://securedorg.github.io/images/rightarrow.png) | ## Techniques Overview ## * [Compression](#compression) * [Obfuscation](#obfuscation) * [Persistence](#persistence) * [Privilege Escalation](#privilege-escalation) * [Defense Evasion](#defense-evasion) * [Credential Theft](#credential-theft) * [Reconnaissance](#recon) * [Lateral Movement](#lateral-movement) * [Execution](#execution) * [Collection](#collection) * [Exfiltration](#exfiltration) * [Command and Control](#command-and-control) ## Compression ## Obfuscation ## Persistence ![alt text](https://securedorg.github.io/images/Persistence.png "Persistence") ## Privilege Escalation ## Defense Evasion ## Credential Theft ## Reconnaissance ## Lateral Movement ## Execution ## Collection ## Exfiltration ## Command and Control [x86 Assembly <- Back](https://securedorg.github.io/RE101/section1.3) | [Next -> Section 3](https://securedorg.github.io/RE101/section3)