Files
securedorg.github.io/malware.md
Amanda Rousseau 2a7fe1aa3f adding arrows
2017-03-08 17:04:01 -08:00

1.7 KiB

layout, permalink, title
layout permalink title
default /RE101/section2/ Malware Techniques

Go Back to Reverse Engineering Malware 101

Section 2: Malware Techniques

Typical Attack Flow

Perimeter Recon Infiltrate Internal Recon Entrench Exfiltrate Purge
alt text alt text alt text alt text alt text alt text

Techniques Overview

Compression

Obfuscation

Persistence

alt text

Privilege Escalation

Defense Evasion

Credential Theft

Reconnaissance

Lateral Movement

Execution

Collection

Exfiltration

Command and Control

x86 Assembly <- Back | Next -> Section 3