INDEX

Symbols and numbers

>(backticks), 205, 12

/* */ comments, 178

#$ format token, 230–231

// comments, 178

/x, 228

< (less-than operator), 177

<= (less-than-or-equal-to operator), 177

%x token, 229

!token in Process Explorer debugger, 539–541

18 USC 1029 (ADS), 25–29

18 USC 1030 (CFAA), 29–38

18 USC 2510 of ECPA, 38–42

18 USC 2701 of ECPA, 38–42

A

Access Check. See also access control

about, 535

allowed ACEs, 537

DACL checks with, 535–536

dumping ACLs with, 541, 542

enumerating executable files with, 569

flowchart of, 536

privilege checks with, 535

restricted SIDs access rights, 537

restricted tokens, 537

access control, 525–577. See also Access Check; ACEs

about Vista’s, 496

access mask, 532, 533

access tokens, 528–531, 537, 538–542,

Get Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.