L


Ldr (Loader manager), functional group, 40

LdrGetDllHandle, routine, 40

LdrGetProcedureAddress, routine, 40

LdrInitializeThunk, routine, 40

LdrLockLoaderLock, routine, 40

LdrUnlockLoaderLock, routine, 40

library, finding a specific, 4447

link heartbeats, feedback, 244

link library, code, 4446

Listen, function, 270272

Listen.cs file

code, 271–272

functions list, 270

rootkit remote controller implementation, 270–272

listOffset, global variable, 210211

Load File dialog box, 307

Loader Manager (Ldr), functional group, 40

loader operations, functional groups for hooking, 40

loading

demand start, 21

the rootkit, 24

Local Kernel Debugger, opening the, 7

LogAttachments, function, 219231

LogBody, function, 219231

LogContent, function, 219231, 234239

Lotus files, E-mail filtering, 233

Lotus Notes

Client Extension testing code, 242

E-mail filtering overview, 232–233

installing a Lotus Notes client filter, 241–242

LotusExtension.c file, 234–239

LotusExtension.def file, 240

LotusExtension.h file, 234

LotusExtension.mak file, 240

readme.txt file, 241

testing the Lotus Notes client extension, 242

Lotus Notes C API, downloading, 233

LotusExtension.c

code, 235–239

E-mail filtering, 234–239

E-mail filtering implementation file, 232

functions list, 234

LotusExtension.def

code, 240

E-mail filtering, 240

E-mail filtering implementation file, 232

LotusExtension.h

code, 234

E-mail filtering implementation file, 232, 234

LotusExtension.mak

code, 240

E-mail filtering, 240

E-mail filtering implementation file, 232

low-level technology, interface-driven versus, 256

lstrcmpiW, function, 5051




Professional Rootkits
Professional Rootkits (Programmer to Programmer)
ISBN: 0470101547
EAN: 2147483647
Year: 2007
Pages: 229
Authors: Ric Vieler

Similar book on Amazon
Rootkits: Subverting the Windows Kernel
Rootkits: Subverting the Windows Kernel
A Guide to Kernel Exploitation: Attacking the Core
A Guide to Kernel Exploitation: Attacking the Core
Reversing: Secrets of Reverse Engineering
Reversing: Secrets of Reverse Engineering
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net