A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits, and applies them to different operating systems, namely, UNIX derivatives, Mac OS X, and Windows. Concepts and tactics are presented categorically so that even when a specifically detailed vulnerability has been patched, the foundational information provided will help hackers in writing a newer, better attack; or help pen testers, auditors, and the like develop a more concrete design and defensive structure.
The book is organized into four parts. Part I introduces the kernel and sets out the theoretical basis on which to build the rest of the book. Part II focuses on different operating systems and describes exploits for them that target various bug classes. Part III on remote kernel exploitation analyzes the effects of the remote scenario and presents new techniques to target remote issues. It includes a step-by-step analysis of the development of a reliable, one-shot, remote exploit for a real vulnerabilitya bug affecting the SCTP subsystem found in the Linux kernel. Finally, Part IV wraps up the analysis on kernel exploitation and looks at what the future may hold.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
Enrico Perla currently works as a kernel programmer at Oracle. He received his B.Sc. in Computer Science from the University of Torino, and his M.Sc. in Computer Science from Trinity College Dublin. His interests range from low-level system programming to low-level system attacking, exploiting, and exploit countermeasures.
Massimiliano Oldani currently works as a Security Consultant at Emaze Networks. His main research topics include operating system security and kernel vulnerabilities.
The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits and applies them to different operating systems (Linux, Solaris, Mac OS X, and Windows). Kernel exploits require both art and science to achieve. Every OS has its quirks and so every exploit must be molded to fully exploit its target. This book discusses the most popular OS families―UNIX derivatives, Mac OS X, and Windows―and how to gain complete control over them. Concepts and tactics are presented categorically so that even when a specifically detailed exploit has been patched, the foundational information that you have read will help you to write a newer, better attack or a more concrete design and defensive structure.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Anbieter: Ammareal, Morangis, Frankreich
Softcover. Zustand: Très bon. Ancien livre de bibliothèque avec équipements. Edition 2010. Ammareal reverse jusqu'à 15% du prix net de cet article à des organisations caritatives. ENGLISH DESCRIPTION Book Condition: Used, Very good. Former library book. Edition 2010. Ammareal gives back up to 15% of this item's net price to charity organizations. Artikel-Nr. I-189-916
Anzahl: 1 verfügbar
Anbieter: PBShop.store US, Wood Dale, IL, USA
PAP. Zustand: New. New Book. Shipped from UK. Established seller since 2000. Artikel-Nr. GB-9781597494861
Anbieter: PBShop.store UK, Fairford, GLOS, Vereinigtes Königreich
PAP. Zustand: New. New Book. Shipped from UK. Established seller since 2000. Artikel-Nr. GB-9781597494861
Anzahl: 2 verfügbar
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
Zustand: New. In. Artikel-Nr. ria9781597494861_new
Anzahl: Mehr als 20 verfügbar
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
Zustand: New. pp. 466 3:B&W 7.5 x 9.25 in or 235 x 191 mm Perfect Bound on White w/Gloss Lam. Artikel-Nr. 6586847
Anzahl: 3 verfügbar
Anbieter: Kennys Bookstore, Olney, MD, USA
Zustand: New. 2010. 1st Edition. Paperback. Covers the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits and applies them to different operating systems (Linux, Solaris, Mac OS X, and Windows). This title discusses the most popular OS families - UNIX derivatives, Mac OS X, and Windows - and how to gain complete control over them. Num Pages: 466 pages, 1, black & white illustrations. BIC Classification: UL; URH. Category: (P) Professional & Vocational. Dimension: 234 x 192 x 25. Weight in Grams: 858. . . . . . Books ship from the US and Ireland. Artikel-Nr. V9781597494861
Anzahl: 2 verfügbar
Anbieter: Speedyhen, Hertfordshire, Vereinigtes Königreich
Zustand: NEW. Artikel-Nr. NW9781597494861
Anzahl: 2 verfügbar
Anbieter: moluna, Greven, Deutschland
Zustand: New. Artikel-Nr. 596371775
Anzahl: 2 verfügbar
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
Paperback. Zustand: Brand New. 1st edition. 442 pages. 9.20x7.50x1.00 inches. In Stock. Artikel-Nr. x-1597494860
Anzahl: 2 verfügbar
Anbieter: Baues Verlag Rainer Baues , Bremen, Deutschland
23 cm, Hardcover. Zustand: Sehr gut. 442 Seiten + Englischer Text. Nur wenige leichte Gebrauchsspuren. Sehr gut. 9781597494861 Jedes unserer Angebote wird mit einem Originalfoto von uns eingestellt! Sprache: Englisch Gewicht in Gramm: 1020. Artikel-Nr. 5779
Anzahl: 2 verfügbar