index_M

 < Day Day Up >   


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Z]

MAC addresses
MAC interface
Machine status word
Major function pointers
MAKEFILE file
MAKELONG macro 2nd
Malicious code
Malicious modifications
MappedSystemCallTable function
Mapping scancodes
MDL [See Memory Descriptor Lists]
Memory Descriptor Lists (MDLs)
Memory descriptor tables
Memory management
     access restrictions 2nd
     by kernel
     for SSDTs
Memory pages
     address translation for
     checks for 2nd
     multiple processes
    page directories
         checks
         entries 2nd
         multiple
    page tables
         directories
         entries
         lookups
     processes and threads in
     read-only access to
Memory space for hooking
METHOD_BUFFERED function
METHOD_NEITHER function
Microcode updates
Microsoft, bug fixes by
Migbot rootkit
     loading drivers with
     rerouting control flow using
Minimal footprints
Model-Specific Registers (MSRs)
Modifications
     firmware
     software 2nd
     source-code
     tokens
MODULE_ENTRY structure 2nd
MODULE_INFO structure
MODULE_INFORMATION structure
MODULEINFO structure
Monitors, keystroke
Morris Worm
Motives of attackers
Moving whole packets
MSRs (Model-Specific Registers)
Multiple page directories and processes in memory pages
Multiprocessor systems
my_function_detour_ntdeviceiocontrolfile function 2nd
my_function_detour_seaccesscheck function
MyImageLoadNotify function
MyKiFastCallEntry function
MyPassThru function

 < Day Day Up >   


Rootkits(c) Subverting the Windows Kernel
Rootkits: Subverting the Windows Kernel
ISBN: 0321294319
EAN: 2147483647
Year: 2006
Pages: 111

Similar book on Amazon

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net