O'Reilly logo

Gray Hat Hacking The Ethical Hacker’s Handbook by Jonathan Ness, Chris Eagle, Shon Harris, Gideon Lenkey, Allen Harper, Terron Williams

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

INDEX

Symbols and numbers

>(backticks), 205, 12

/* */ comments, 178

#$ format token, 230–231

// comments, 178

/x, 228

< (less-than operator), 177

<= (less-than-or-equal-to operator), 177

%x token, 229

!token in Process Explorer debugger, 539–541

18 USC 1029 (ADS), 25–29

18 USC 1030 (CFAA), 29–38

18 USC 2510 of ECPA, 38–42

18 USC 2701 of ECPA, 38–42

A

Access Check. See also access control

about, 535

allowed ACEs, 537

DACL checks with, 535–536

dumping ACLs with, 541, 542

enumerating executable files with, 569

flowchart of, 536

privilege checks with, 535

restricted SIDs access rights, 537

restricted tokens, 537

access control, 525–577. See also Access Check; ACEs

about Vista’s, 496

access mask, 532, 533

access tokens, 528–531, 537, 538–542,

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required