Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] L0phtCrack (password cracking program) LADS (tool) Langton, Christopher Glanguage dependency of macro viruses 2nd large scale damage due to wormslayers of indirection LE (linear executable) file formatLeapfrog (virus) infection technique Lehigh (virus) infection technique Leitold, Ferenc Lexotan engine lfanew field modification (infection technique) 2nd LFM (virus) 2nd LIB viruses 2nd 3rdlibraries direct function invocation detection 2nd 3rd return-toLIBC attacks 2nd 3rd 4th Libsafe (subsystem extension) 2nd Life (game) 2nd 3rd 4th 5th 6thlife-cycle manager of worms 2nd 3rd 4th linear executable (LE) file format linker dependency 2ndlinking DLLs to executables 2nd 3rd 4thlinks to Web sites or proxies 2nd 3rdLinux ELF virusesLinux/ADM (worm) detailed description of 2nd shellcode blocking Linux/Cheese (worm) Linux/Jac.8759 (virus) Linux/Lion (antiworm) Linux/Peelf (virus)Linux/Simile (virus) [See metamorphic viruses;W32/Simile virus]Linux/Simile.D (virus) self-protection technique Linux/Slapper (virus) 2nd Linux/Slapper (worm) 2nd 3rd blocking buffer overflow attacks 2nd capturing 2nd 3rd detailed description of 2nd 3rd 4th 5th 6th 7th 8th DoS attack e-mail address harvesting GOT and IAT page attributes heap overflows peer-to-peer network control 2nd 3rd 4th predefined class table for network scanning 2nd 3rd 4th shell code-based attacks shellcode blocking worm blocking techniques Linux/Slapper attacklistings 1260 virus decryptor 16-bit Intel CPU emulator snippet ACG sample instance Apache Web Server answer to Linux/Slapper GET request architectural structure of Linux/Slapper worm Babylonia worm's message bogus GET request of Linux/Slapper worm bogus program subject to code injection attacks bogus program with incorrect formatting syntax buggy C code Cascade virus decryptor class definitions of Linux/Slapper worm CodeGreen GET request CodeGreen worm messages Coke's polymorphic macro 2nd Core Wars instructions (1994 revision) corrupted macro example decoding security cookies DOS COM infector virus Dwarf bombing warrior program Dwarf's code when first bomb is dropped first-generation Win32 heuristics format string application function imports function pointer application example heap overflow example hiding CALL-to-POP trick hook routine entry of Frodo Hybris update in alt.comp.virus IAT hooking interrupt hooking by Stoned virus JMP instruction to Frodo's hook routine kernel and loaded driver map on 64-bit Windows on IA64 loaded drivers and base addresses in 32-bit address space MSIL/Gastropod virus generations MtE-generated decryptor NtOpenThread() API definition obfuscated code obfuscated trick of Whale parameters of send() function potential overflow condition randomized IP address builder routine of Linux/Slapper worm Ring 0 Scriptlet.Typelib to write into a file section modification of W95/Anxiety.1358 section table of CALC.EXE service call on NT on IA32 service call on Pentium II processors setting security cookies shellcode of Morris worm single-stepping, detecting using stack state SMEG.Quueq virus, decrypted SMEG.Quueq virus, encrypted source infector virus standard security handler Stoned.A virus map Stoned.B virus map system executables and DLLs system service call on IA64 typical host's configuration file vulnerable program (heap overflows) W32/Cabanas virus at end of user address space W32/CodeRed variants and threads W32/Evol virus generations W32/Heretic.1986.A at end of infected KERNEL32.DLL in memory W32/Heretic.1986.A modifies export address of CreateProcess APIs W32/Niko.5178 virus creates two threads W32/Niko.5178 virus in infected ASD.EXE application W32/Parvo inside NOTEPAD's address space W32/Parvo runs original NOTEPAD.EXE as JRWK.EXE W95/Fabi virus emulation W95/Fabi.9608 virus, decrypted W95/Fabi.9608 virus, encrypted W95/Mad virus decrypted snippet W95/Mad virus encrypted snippet W95/Mad.2736 virus decryptor W95/Marburg virus decryptor instance W95/Memorial virus decryptor 2nd W95/Puron virus detection W95/Regswap generations WNT/RemEx running as ie403r.sys service X-RAY of SMEG viruses Zeppelin virus, generic disinfection Liston, Tomlists router access 2nd 3rd Litchfield, David 2nd LMF (lunar manufacturing facility) LNK viruses 2nd loaded DLLs, disinfecting LoadLibrary() functionlogging modulelogic bombs definition of 2nd Logic worm 2nd 3rd 4thLogo language Super Logo viruses 2nd 3rd 4thlogs File Monitor long loopsLorez [See W95/Lorez (virus)] Lotus 1-2-3 macro viruses 2nd Lotus Word Pro viruses 2ndLoveLetter [See VBS/LoveLetter.A@mm (worm)] low-interaction honeypot systemsLucifer (virus) infection technique Ludwig, Mark lunar manufacturing facility (LMF) LWP/Spenty (virus) LX viruses 2nd |