mirror of
https://github.com/aljazceru/securedorg.github.io.git
synced 2025-12-20 23:44:19 +01:00
1.7 KiB
1.7 KiB
layout, permalink, title
| layout | permalink | title |
|---|---|---|
| default | /RE101/section2/ | Malware Techniques |
Go Back to Reverse Engineering Malware 101
Section 2: Malware Techniques
Typical Attack Flow
| Perimeter Recon | Infiltrate | Internal Recon | Entrench | Exfiltrate | Purge |
|---|---|---|---|---|---|
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Techniques Overview
- Compression
- Obfuscation
- Persistence
- Privilege Escalation
- Defense Evasion
- Credential Theft
- Reconnaissance
- Lateral Movement
- Execution
- Collection
- Exfiltration
- Command and Control

