Files
securedorg.github.io/malware.md
Amanda Rousseau c05f9eb10d adding persistence
2017-03-08 16:11:10 -08:00

54 lines
1.1 KiB
Markdown

---
layout: default
permalink: /RE101/section2/
title: Malware Techniques
---
[Go Back to Reverse Engineering Malware 101](https://securedorg.github.io/RE101/)
# Section 2: Malware Techniques #
## Typical Attack Flow ##
## Techniques Overview ##
* [Compression](#compression)
* [Obfuscation](#obfuscation)
* [Persistence](#persistence)
* [Privilege Escalation](#privilege-escalation)
* [Defense Evasion](#defense-evasion)
* [Credential Theft](#credential-theft)
* [Reconnaissance](#recon)
* [Lateral Movement](#lateral-movement)
* [Execution](#execution)
* [Collection](#collection)
* [Exfiltration](#exfiltration)
* [Command and Control](#command-and-control)
## Compression
## Obfuscation
## Persistence
![alt text](https://securedorg.github.io/images/Persistence.png "Persistence")
## Privilege Escalation
## Defense Evasion
## Credential Theft
## Reconnaissance
## Lateral Movement
## Execution
## Collection
## Exfiltration
## Command and Control
[x86 Assembly <- Back](https://securedorg.github.io/RE101/section1.3) | [Next -> Section 3](https://securedorg.github.io/RE101/section3)