Files
securedorg.github.io/malware.md
Amanda Rousseau 6cf9d9ac06 adding arrows
2017-03-08 16:58:30 -08:00

1.7 KiB

layout, permalink, title
layout permalink title
default /RE101/section2/ Malware Techniques

Go Back to Reverse Engineering Malware 101

Section 2: Malware Techniques

Typical Attack Flow

Perimeter Recon Infiltration Internal Recon Entrenchment Exfiltration Purge
alt text alt text alt text alt text alt text alt text

Techniques Overview

Compression

Obfuscation

Persistence

alt text

Privilege Escalation

Defense Evasion

Credential Theft

Reconnaissance

Lateral Movement

Execution

Collection

Exfiltration

Command and Control

x86 Assembly <- Back | Next -> Section 3