mirror of
https://github.com/aljazceru/securedorg.github.io.git
synced 2026-01-08 08:44:28 +01:00
49 lines
1.0 KiB
Markdown
49 lines
1.0 KiB
Markdown
---
|
|
layout: default
|
|
permalink: /RE101/section2/
|
|
title: Malware Techniques
|
|
---
|
|
[Go Back to Reverse Engineering Malware 101](https://securedorg.github.io/RE101/)
|
|
|
|
# Section 2: Malware Techniques #
|
|
|
|
## Typical Attack Flow ##
|
|
|
|
## Techniques Overview ##
|
|
* [Compression](#compression)
|
|
* [Obfuscation](#obfuscation)
|
|
* [Persistence](#persistence)
|
|
* [Privilege Escalation](#privilege-escalation)
|
|
* [Defense Evasion & Clean up](#defense-evasion)
|
|
* [Credential Theft](#cred-theft)
|
|
* [Reconnaissance](#recon)
|
|
* [Lateral Movement](#lateral-movement)
|
|
* [Execution](#execution)
|
|
* [Collection](#collection)
|
|
* [Exfiltration](#exfiltration)
|
|
* [Command and Control](#c-and-c)
|
|
|
|
## Obfuscation
|
|
|
|
## Persistence
|
|
|
|
## Privilege Escalation
|
|
|
|
## Defense Evasion & Clean up
|
|
|
|
## Credential Theft
|
|
|
|
## Reconnaissance
|
|
|
|
## Lateral Movement
|
|
|
|
## Execution
|
|
|
|
## Collection
|
|
|
|
## Exfiltration
|
|
|
|
## Command and Control
|
|
|
|
[x86 Assembly <- Back](https://securedorg.github.io/RE101/section1.3) | [Next -> Section 3](https://securedorg.github.io/RE101/section3)
|