index_C

 < Day Day Up >   


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Z]

Call gates
Callbacks, protocol driver
Calls
     DPCs
     far
     in rootkit detection
Cavern infection
Chains, driver
Channels, covert. [See Covert channels]
Checked build environments
CheckFunctionBytesNt DeviceIoControlFile function
CheckFunctionBytesSe AccessCheck function
CheckNtoskrnlForOutsideJump function
CIH virus
Cleanup routines
cli instruction
Code
     introducing into kernel
    patching. [See Patching]
Code segment (CS) registers
Code-byte patching method
Code-scanning tools, automated
COMMAND BYTE for keyboard ports
Compiler libraries
Completion routines for IRPs
Connecting to remote servers
CONNECTION_CONTEXT pointer
CONNINFO101 structure
CONNINFO102 structure
CONNINFO110 structure
CONTAINING_RECORD macro
Contexts
     active process
     for endpoints
Control flow, rerouting
Control Register Zero (CR0) 2nd
Control registers
Controllers, keyboard. [See Keyboard controller access]
ConvertScanCodeToKeyCode function
Covert channels
     disguised TCP/IP protocols
    host emulation. [See Host emulation]
    NDIS in. [See NDIS interface]
     raw network manipulation
     remote command, control, and exfiltration of data
    TDI in. [See TDI (Transport Data Interface) specification]
CPLs [See Current Privilege Levels]
CPUs
     for ring enforcement
     interrupts for
     tables for
CR0 (Control Register Zero) 2nd
CR1 register
CR2 register
CR3 register 2nd 3rd
CR4 register
CreateRemoteThread function
CS (code segment) registers
CSDVersion key
CSRSS.EXE file
ctrl2cap driver
Current privilege levels (CPLs)
CurrentBuildNumber key
CurrentVersion key
Cyberwarfare

 < Day Day Up >   


Rootkits(c) Subverting the Windows Kernel
Rootkits: Subverting the Windows Kernel
ISBN: 0321294319
EAN: 2147483647
Year: 2006
Pages: 111

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net