Rootkits: Subverting the Windows Kernel

 < Day Day Up >   

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Z]

UDP packets, spoofing

UNHOOK_SYSCALL macro UnhookDrive function UNIX operating systems

Unload function

     for keyboard sniffers

     for Windows device drivers

Updates, microcodeUser mode

     determining the OS version from     file handles for 2nd

     fusion rootkits for     Ring Three programs 2nd User/supervisor bitUserland     device driver communication from

     hooks

         IAT

         injecting DLLs into processes

         inline functions

 < Day Day Up >   

Категории