Files
securedorg.github.io/malware.md
2017-03-08 13:45:13 -08:00

1.0 KiB

layout, permalink, title
layout permalink title
default /RE101/section2/ Malware Techniques

Go Back to Reverse Engineering Malware 101

Section 2: Malware Techniques

Typical Attack Flow

Techniques Overview

Compression

Obfuscation

Persistence

Privilege Escalation

Defense Evasion

Credential Theft

Reconnaissance

Lateral Movement

Execution

Collection

Exfiltration

Command and Control

x86 Assembly <- Back | Next -> Section 3