Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [R] [S] [T] [U] [V] [W] [Z] Call gates Callbacks, protocol driverCalls DPCs far in rootkit detection Cavern infection Chains, driverChannels, covert. [See Covert channels] Checked build environments CheckFunctionBytesNt DeviceIoControlFile function CheckFunctionBytesSe AccessCheck function CheckNtoskrnlForOutsideJump function CIH virus Cleanup routines cli instructionCode introducing into kernelpatching. [See Patching] Code segment (CS) registers Code-byte patching method Code-scanning tools, automated COMMAND BYTE for keyboard ports Compiler libraries Completion routines for IRPs Connecting to remote servers CONNECTION_CONTEXT pointer CONNINFO101 structure CONNINFO102 structure CONNINFO110 structure CONTAINING_RECORD macroContexts active process for endpoints Control flow, rerouting Control Register Zero (CR0) 2nd Control registersControllers, keyboard. [See Keyboard controller access] ConvertScanCodeToKeyCode function Covert channels disguised TCP/IP protocolshost emulation. [See Host emulation]NDIS in. [See NDIS interface] raw network manipulation remote command, control, and exfiltration of dataTDI in. [See TDI (Transport Data Interface) specification]CPLs [See Current Privilege Levels]CPUs for ring enforcement interrupts for tables for CR0 (Control Register Zero) 2nd CR1 register CR2 register CR3 register 2nd 3rd CR4 register CreateRemoteThread function CS (code segment) registers CSDVersion key CSRSS.EXE file ctrl2cap driver Current privilege levels (CPLs) CurrentBuildNumber key CurrentVersion key Cyberwarfare |