Rootkits: Subverting the Windows Kernel

 < Day Day Up >   

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Z]

Access

     file    hardware. [See Hardware]     rings for

Acrostic messages

Active offenses

Active process contexts

Address resolution protocol (ARP)Addresses

     creating     endpoint associations with

     for processes     hardware     in detour patching     in paging     kernel module

     MAC

     structures for

     virtual 2nd 3rd

AdjustTokenGroups function

AdjustTokenPrivileges function

Advisories, security

Alignment, instruction

AllCPURaised function

AMD processors, microcode updates

AppInit_DLLs key

Area-of-effect restrictions

ARP [See Address Resolution Protocol]

ASCII payloads, steganography on

Attacker motives Attacks, bounce

Authentication functions, patching

Authentication IDs (AUTH_IDs)

Automated code-scanning tools

 < Day Day Up >   

Категории