mirror of
https://github.com/aljazceru/securedorg.github.io.git
synced 2025-12-24 09:24:20 +01:00
1.0 KiB
1.0 KiB
layout, permalink, title
| layout | permalink | title |
|---|---|---|
| default | /RE101/section2/ | Malware Techniques |
Go Back to Reverse Engineering Malware 101
Section 2: Malware Techniques
Typical Attack Flow
Techniques Overview
- Compression
- Obfuscation
- Persistence
- Privilege Escalation
- Defense Evasion
- Credential Theft
- Reconnaissance
- Lateral Movement
- Execution
- Collection
- Exfiltration
- Command and Control