Rootkits: Subverting the Windows Kernel

 < Day Day Up >   

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Z]

Back doors

     drawbacks of     software for     to op-codes

Back Orifice program 2nd

Behavior detection

BHOs (Browser Helper Objects)

Binary code, patching bind function

Binding     in IAT hooking

     in inline function hooking     to interfaces BIOS, accessingBLINK member     as process pointer

     changing value of 2nd 3rd

Bootloaders, modifying

Bootstrap code, activation of

Bouncing packets

Browser Helper Objects (BHOs)

Buffer pools

Buffer-overflow exploits 2nd

Buffers in NDIS 2nd

Bug fixes by Microsoft

Build environments

Build utility

Bus

     data

     I/O     PCI

Bypassing

     firewalls

     forensic tools

 < Day Day Up >   

Категории