INDEX
Symbols and numbers
/* */ comments, 178
#$ format token, 230–231
// comments, 178
/x, 228
< (less-than operator), 177
<= (less-than-or-equal-to operator), 177
%x token, 229
!token in Process Explorer debugger, 539–541
18 USC 1029 (ADS), 25–29
18 USC 1030 (CFAA), 29–38
18 USC 2510 of ECPA, 38–42
18 USC 2701 of ECPA, 38–42
A
Access Check. See also access control
about, 535
allowed ACEs, 537
DACL checks with, 535–536
enumerating executable files with, 569
flowchart of, 536
privilege checks with, 535
restricted SIDs access rights, 537
restricted tokens, 537
access control, 525–577. See also Access Check; ACEs
about Vista’s, 496
Get Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.