index_R

 < Day Day Up >   


Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Z]

RaiseCPUIrqlAndWait function
Raw network manipulation
     binding to interfaces
     bouncing packets
     forging sources
     on Windows XP
     sending packets
     sniffing
Read-only table access
ReadFile function 2nd
Reading ports
Reboots
     from keyboard controllers
     surviving
recvfrom function
Registering
     for surviving reboot
     protocols
Registers
     control
     latching between
Registry
     for injecting DLLs into processes
     key detection
     operating system version queries in
RegOpenKeyEx function
RegQueryValue function
RegQueryValueEx function 2nd
Relative Virtual Addresses (RVAs)
Remote command and control 2nd
Remote servers
     connecting to
     sending data to
Remote shells
Remote threads
Reordering of instructions
REQINFO structure
Rerouting control flow
ResponseToArp function
Restarting rootkits
Returns, far
Ring Zero
Rings 2nd
RootkitDispatch function
RootkitRevealer tool
Rootkits
     and software exploits
     characteristics of
     detecting
         behavior detection
         guarding-the-doors approach
         looking for hooks
         scanning rooms
     for kernel
     history of
     legitimate uses of
     loading
     offensive technologies
     operation of
     purpose of
     restarting
     vs. exploits
     vs. viruses
RtlCopyMemory function
RtlGetVersion function
Run key
Runtime address fixups
Runtime patching
    detour. [See Detour patching]
     jump templates
     variations
RVAs [See Relative Virtual Addresses]

 < Day Day Up >   


Rootkits(c) Subverting the Windows Kernel
Rootkits: Subverting the Windows Kernel
ISBN: 0321294319
EAN: 2147483647
Year: 2006
Pages: 111

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net