mirror of
https://github.com/aljazceru/securedorg.github.io.git
synced 2025-12-23 00:44:22 +01:00
58 lines
1.7 KiB
Markdown
58 lines
1.7 KiB
Markdown
---
|
|
layout: default
|
|
permalink: /RE101/section2/
|
|
title: Malware Techniques
|
|
---
|
|
[Go Back to Reverse Engineering Malware 101](https://securedorg.github.io/RE101/)
|
|
|
|
# Section 2: Malware Techniques #
|
|
|
|
## Typical Attack Flow ##
|
|
|
|
| Perimeter Recon | Infiltrate | Internal Recon | Entrench | Exfiltrate | Purge |
|
|
| ------------ |:------------:|:------------:|:------------:|:------------:|:------------:|
|
|
|  |  |  |  |  |  |
|
|
|
|
## Techniques Overview ##
|
|
* [Compression](#compression)
|
|
* [Obfuscation](#obfuscation)
|
|
* [Persistence](#persistence)
|
|
* [Privilege Escalation](#privilege-escalation)
|
|
* [Defense Evasion](#defense-evasion)
|
|
* [Credential Theft](#credential-theft)
|
|
* [Reconnaissance](#recon)
|
|
* [Lateral Movement](#lateral-movement)
|
|
* [Execution](#execution)
|
|
* [Collection](#collection)
|
|
* [Exfiltration](#exfiltration)
|
|
* [Command and Control](#command-and-control)
|
|
|
|
## Compression
|
|
|
|
## Obfuscation
|
|
|
|
## Persistence
|
|
|
|

|
|
|
|
## Privilege Escalation
|
|
|
|
## Defense Evasion
|
|
|
|
## Credential Theft
|
|
|
|
## Reconnaissance
|
|
|
|
## Lateral Movement
|
|
|
|
## Execution
|
|
|
|
## Collection
|
|
|
|
## Exfiltration
|
|
|
|
## Command and Control
|
|
|
|
|
|
[x86 Assembly <- Back](https://securedorg.github.io/RE101/section1.3) | [Next -> Section 3](https://securedorg.github.io/RE101/section3)
|