Day 4 Flashcards

(44 cards)

1
Q

ntoskrnl.exe

A

the kernel process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

HAL.DLL (hardware abstraction layer)

A

a kernel-loadable module that operates between the hardware and the executive so that applications an device drivers don’t have to be aware of hardware-specific information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Kernel

A
lower layer of ntoskrnl.exe
has 4 main responsibilities:
Thread scheduling
Interrupt and exception handling
Low-level processor synchronization
power failure Recovery
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Windows executive

A

the upper layer of ntoskrnl.exe and is the Windows system call handler that verifies and provides kernel services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Windows executive components

A

Object manager, security reference monitor, process manager, virtual memory manager, I\O manager, asynchronous local inter-process communication, configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

object manager

A

provides standardized interface for every system object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

security reference monitor

A

enforces local computer security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

process manager

A

creates, manages, and terminates processes and threads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

virtual memory manager

A

provides private address space for each process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

I\O manager

A

processes all file and I\O requests; responsible for dispatching to device drivers as well as plug and play capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

asynchronous local inter-process communication (ALPC)

A

passes messages between client and server processes on the same computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

configuration manager

A

responsible for implementing and managing the registry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

object criteria

A

Each object belongs to a statically defined class
Objects are kernel services that multiple processes can share.
A process references objects via handles
Objects use pointers to reference and use other objects within kernel mode
Objects use hierarchical directories and naming structures
Objects are protected by object-based security and support synchronization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Object manager

A

key responsibilities: standardizing the interface with all objects, object retention, and object security.

each object has an object header and object body

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

object header and object body

A
the object header stores data used by the object manager to manage objects regardless of their type or class.
Key object header fields:
Name
security descriptor
handle count
reference count

the executive manager responsible for creating the object controls the object body.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

object header attributes

A

object type: points to the type of object it is

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

type object attributes

A

methods: one or more routines that the object manager calls at certain points in an objects lifetime.
(the actions or routines the objects can perform)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

object methods

A

open
close
delete

19
Q

object security

A

specifies who can perform what actions on the object.

the SECURITY DESCRIPTOR holds the ACL for that object

20
Q

Security Descriptor

A

built from information from the following sources
default security
inherited from parent object
explicit permissions set by user

21
Q

ACL’s

A

there are two types of ACL’s: DACL and SACL

22
Q

DACL

A

identifies permissions to a resource
Empty DACL -no access to anyone
null DACL-access to everyone

23
Q

SACL

A

controls how the system audits object access attempts

24
Q

Security Reference Monitor (SRM)

A

enforces security policies.
guards kernel mode resources by performing object access protection and auditing.
The OBJECT MANAGER calls the SRM.

25
two functions of the SRM
compares the process's access token to the object's security descriptor to determine whether access is permitted. Generates most of the audit records in the Security event log
26
windows security audits
used to track both user and system activities | we focus on OBJECT ACCESS events
27
process manager
creates, manages, and terminates processes and threads
28
process resources
``` Handles an Executable program (image file) an Access token a Private virtual address space PID Thread ```
29
more on processes
although processes inherit handles and variables from their parents, each process is self contained. a parent can exit without effecting the child
30
the seven stages of process completion
Step 1: Executable calls CreateProcess() function Step2: System call opens the image Step3: create executive process object Step4: create the initial thread Step5: subsystem notifications Step6: start execution of initial thread Step7 finalize new process initialization
31
Virtual memory manager (VMM)
two primary tasks: mapping swapping uses a swap file (pagefile.sys) for swapping memory
32
VMM also performs:
provides a set of system services to virtual memory shares memory between processes maps files into memory retrieves information about a range of virtual pages changes virtual page protection locks virtual pages into memory
33
32 bit address space address space
x86 architecture uses 4GB of RAM
34
64 bit address space
x64 architecture is aproximately 16 exabytes current processors limit support to 256TB (only uses 48 of the 64 bit address space. Windows 64 bit limits address space to 16TB. 8TB to the top space for the Kernel 8TB to the bottom space for the user. the space in the middle is Free Space. if the top meets the bottom, an overflow occurs
35
Paging
divides aprocess's virtual address space and physical memory (RAM) into equally-sized chunks
36
Page status
pages can be: Free reserved committed
37
VMM mapping virtual address to frame addess
Page Table Selector PTS Page Table PT Page Table Entry 48 bit PTE Page Table Entry Selector PTES 12 bits Offset
38
reasons for page faults
accessing a page that has been swapped out to disk Accessing a page that isn't committed Attempting to write to a page that is read-only Executing code in a page that is marked as "no execute"
39
shared memory
memory that is visible or present in more than one process's virtual address space
40
memory protection :to keep processes from potentially corrupting unauthorized address space in the following ways
Each process has virtual address space PTE control bits and ACL's prevent unauthorized access No execute page protection (DEP) hardware controlled memory protection
41
I\O manager
connects applications and system components to virtual, logical, and physical devices Device, file, driver
42
I\O requests
An I\O request packet (IRP) represents most I\O requests
43
Asynchronous Local Inter-process communication (ALPC)
a message passing mechanism that passes requests. | actual method of communication
44
Configuration manager
responsible for implementing and managing the system registry. ensures the registry is always in a recoverable state