Книга: Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Назад: Privilege Escalation
Дальше: Conclusion

.

. A legitimate program calls the TerminateProcess function, as seen at . Normally, the code will use the IAT to access the target function in Kernel32.dll, but if an IAT hook is installed, as indicated at , the malicious rootkit code will be called instead. The rootkit code returns to the legitimate program to allow the TerminateProcess function to execute after manipulating some parameters. In this example, the IAT hook prevents the legitimate program from terminating a process.