Files
securedorg.github.io/malware.md
Amanda Rousseau 2a7fe1aa3f adding arrows
2017-03-08 17:04:01 -08:00

58 lines
1.7 KiB
Markdown

---
layout: default
permalink: /RE101/section2/
title: Malware Techniques
---
[Go Back to Reverse Engineering Malware 101](https://securedorg.github.io/RE101/)
# Section 2: Malware Techniques #
## Typical Attack Flow ##
| Perimeter Recon | Infiltrate | Internal Recon | Entrench | Exfiltrate | Purge |
| ------------ |:------------:|:------------:|:------------:|:------------:|:------------:|
| ![alt text](https://securedorg.github.io/images/rightarrow.png) | ![alt text](https://securedorg.github.io/images/rightarrow.png) | ![alt text](https://securedorg.github.io/images/rightarrow.png) | ![alt text](https://securedorg.github.io/images/rightarrow.png) | ![alt text](https://securedorg.github.io/images/rightarrow.png) | ![alt text](https://securedorg.github.io/images/rightarrow.png) |
## Techniques Overview ##
* [Compression](#compression)
* [Obfuscation](#obfuscation)
* [Persistence](#persistence)
* [Privilege Escalation](#privilege-escalation)
* [Defense Evasion](#defense-evasion)
* [Credential Theft](#credential-theft)
* [Reconnaissance](#recon)
* [Lateral Movement](#lateral-movement)
* [Execution](#execution)
* [Collection](#collection)
* [Exfiltration](#exfiltration)
* [Command and Control](#command-and-control)
## Compression
## Obfuscation
## Persistence
![alt text](https://securedorg.github.io/images/Persistence.png "Persistence")
## Privilege Escalation
## Defense Evasion
## Credential Theft
## Reconnaissance
## Lateral Movement
## Execution
## Collection
## Exfiltration
## Command and Control
[x86 Assembly <- Back](https://securedorg.github.io/RE101/section1.3) | [Next -> Section 3](https://securedorg.github.io/RE101/section3)