Permissions Flashcards
PAGE_EXECUTE
The memory can be executed, but not written. This protection cannot be userd for mapped files.
PAGE_EXECUTE_READ
The memory can be executed or read, but not written
PAGE_EXECUTE_READWRITE
The memory can be executed, read, or written. Injected code regions almost always have this protection.
PAGE_EXECUTE_WRITECOPY
Enables execute, read-only, or copy-on-write access to a mapped view of a file. It cannot be set by calling VirtualAlloc or VirtualAllocEx. DLLs almost always have this protection.
PAGE_NOACCESS
Disables all access to the memory. This protection cannot be used for mapped files. Applications can prevent accidental reads/write to data by setting this protection.
PAGE_READONLY
The memory can be read, but not executed or written.
PAGE_READWRITE
The memory can be read or written, but not executed.
PAGE_WRITECOPY
Enables read-only or copy-on-write access to a mapped view of a file. It cannot be set by calling VirtualAlloc or VirtualAllocEx.
Process Environmental Block (PEB)
Every _EPROCESS structure contains a member called _PEB. The PEB contains the full path to the process’ executable, the full command line that starts the process, the current working directory, pointers to the process’ heaps, standard handles, and three doubly linked lists that contain the full path to DLLs loaded by the process.