Index


A

Access processing

Rtl routine, 41

Zw routine, 41

AddIndices, function, 190198

AddNewKeyHandle, function, 189198

AddRef, function, 218231

AddTarget, function, 260262

adjustData, function, 7896

AdjustIndices, function, 190198

AdjustNextNewIndex, function, 190198

ADS (Alternate Data Streams)

file-hiding technique, 15–21

syntax for, 20

using, 277

AfterOriginalFunction, function, 6678

Alert, function, 260262

AllocateKeyHandle, function, 190198

allocateUserMemory, function, 6678

alternate data streams (ADS)

file-hiding technique, 15–21

syntax for, 20

using, 277

ANSI Prefix Manager (Pfx), functional group, 4041

ANSI string table operations, functional groups for hooking, 41

anti-rootkit software, types of, 254

AntiHook, anti-rootkit software, 254

application programming, injected function programming versus, 114

ARP cache poisoning, overview, 292

autoloading, overview, 138

automatic updates, rootkit prevention, 292

autostarted application detection, IceSword, 314




Professional Rootkits
Professional Rootkits (Programmer to Programmer)
ISBN: 0470101547
EAN: 2147483647
Year: 2007
Pages: 229
Authors: Ric Vieler

Similar book on Amazon
Rootkits: Subverting the Windows Kernel
Rootkits: Subverting the Windows Kernel
A Guide to Kernel Exploitation: Attacking the Core
A Guide to Kernel Exploitation: Attacking the Core
Reversing: Secrets of Reverse Engineering
Reversing: Secrets of Reverse Engineering
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net