Permissions Flashcards

1
Q

PAGE_EXECUTE

A

The memory can be executed, but not written. This protection cannot be userd for mapped files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

PAGE_EXECUTE_READ

A

The memory can be executed or read, but not written

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

PAGE_EXECUTE_READWRITE

A

The memory can be executed, read, or written. Injected code regions almost always have this protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

PAGE_EXECUTE_WRITECOPY

A

Enables execute, read-only, or copy-on-write access to a mapped view of a file. It cannot be set by calling VirtualAlloc or VirtualAllocEx. DLLs almost always have this protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

PAGE_NOACCESS

A

Disables all access to the memory. This protection cannot be used for mapped files. Applications can prevent accidental reads/write to data by setting this protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

PAGE_READONLY

A

The memory can be read, but not executed or written.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

PAGE_READWRITE

A

The memory can be read or written, but not executed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

PAGE_WRITECOPY

A

Enables read-only or copy-on-write access to a mapped view of a file. It cannot be set by calling VirtualAlloc or VirtualAllocEx.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Process Environmental Block (PEB)

A

Every _EPROCESS structure contains a member called _PEB. The PEB contains the full path to the process’ executable, the full command line that starts the process, the current working directory, pointers to the process’ heaps, standard handles, and three doubly linked lists that contain the full path to DLLs loaded by the process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly