A Guide to Kernel Exploitation

  • Author : Enrico Perla
  • Publsiher : Elsevier
  • Release : 28 October 2010
  • ISBN : 1597494879
  • Page : 464 pages
  • Rating : 5/5 from 1 voters

Download or read online book entitled A Guide to Kernel Exploitation written by Enrico Perla and published by Elsevier. This book was released on 28 October 2010 with total page 464 pages. Available in PDF, EPUB and Kindle. Get best books that you want by click Get Book Button and Read as many books as you like. Book Excerpt : A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits, and applies them to different operating systems, namely, UNIX derivatives, Mac OS X, and Windows. Concepts and tactics are presented categorically so that even when a specifically detailed vulnerability has been patched, the foundational information provided will help hackers in writing a newer, better attack; or help pen testers, auditors, and the like develop a more concrete design and defensive structure. The book is organized into four parts. Part I introduces the kernel and sets out the theoretical basis on which to build the rest of the book. Part II focuses on different operating systems and describes exploits for them that target various bug classes. Part III on remote kernel exploitation analyzes the effects of the remote scenario and presents new techniques to target remote issues. It includes a step-by-step analysis of the development of a reliable, one-shot, remote exploit for a real vulnerabilitya bug affecting the SCTP subsystem found in the Linux kernel. Finally, Part IV wraps up the analysis on kernel exploitation and looks at what the future may hold. Covers a range of operating system families — UNIX derivatives, Mac OS X, Windows Details common scenarios such as generic memory corruption (stack overflow, heap overflow, etc.) issues, logical bugs and race conditions Delivers the reader from user-land exploitation to the world of kernel-land (OS) exploits/attacks, with a particular focus on the steps that lead to the creation of successful techniques, in order to give to the reader something more than just a set of tricks

A Guide to Kernel Exploitation

A Guide to Kernel Exploitation
Author: Enrico Perla,Massimiliano Oldani
Publisher: Elsevier
Relase: 2010-10-28
ISBN: 1597494879
GET BOOK

The Hacker s Guide to OS X

The Hacker s Guide to OS X
Author: Robert Bathurst,Russ Rogers,Alijohn Ghassemlouei
Publisher: Newnes
Relase: 2012-12-31
ISBN: 9781597499545
GET BOOK

CompTIA PenTest Certification All in One Exam Guide Exam PT0 001

CompTIA PenTest  Certification All in One Exam Guide  Exam PT0 001
Author: Raymond Nutting
Publisher: McGraw Hill Professional
Relase: 2018-12-14
ISBN: 9781260135954
GET BOOK

A Guide to the Useful Plants of Solomon Islands

A Guide to the Useful Plants of Solomon Islands
Author: C. P. Henderson,Hancock I. R.
Publisher: Unknown
Relase: 2000
ISBN: UOM:39015052007203
GET BOOK

ESPRIT 88

ESPRIT  88
Author: Commission of the European Communities. Directorate-General for Telecommunications, Information Industries, and Innovation
Publisher: Unknown
Relase: 1988
ISBN: UCSC:32106008980713
GET BOOK

Thesaurus of Information Sciences and Technologies

Thesaurus of Information Sciences and Technologies
Author: Canadian Workplace Automation Research Centre
Publisher: Laval : Canadian Workplace Automation Research Centre
Relase: 1992
ISBN: UOM:39015033143606
GET BOOK

Dvorak s Guide to OS 2 Version 2 1

Dvorak s Guide to OS 2  Version 2 1
Author: John Dvorak,David B. Whittle,Martin McElroy
Publisher: Random House Puzzles & Games
Relase: 1993
ISBN: UOM:39015028902800
GET BOOK

Monthly Weather Review

Monthly Weather Review
Author: Anonim
Publisher: Unknown
Relase: 2004
ISBN: UCR:31210016069492
GET BOOK

Africa Guide

Africa Guide
Author: Richard Synge
Publisher: Unknown
Relase: 1981
ISBN: UOM:39015074936066
GET BOOK

Advanced Infrastructure Penetration Testing

Advanced Infrastructure Penetration Testing
Author: Chiheb Chebbi
Publisher: Packt Publishing Ltd
Relase: 2018-02-26
ISBN: 9781788623414
GET BOOK

GPEN GIAC Certified Penetration Tester All in One Exam Guide

GPEN GIAC Certified Penetration Tester All in One Exam Guide
Author: Raymond Nutting,Mirza Ahmed,William MacCormack
Publisher: McGraw Hill Professional
Relase: 2020-11-05
ISBN: 9781260456752
GET BOOK

Android Hacker s Handbook

Android Hacker s Handbook
Author: Joshua J. Drake,Zach Lanier,Collin Mulliner,Pau Oliva Fora,Stephen A. Ridley,Georg Wicherski
Publisher: John Wiley & Sons
Relase: 2014-03-31
ISBN: 9781118608647
GET BOOK

Fedora 13 Security Guide

Fedora 13 Security Guide
Author: Fedora Documentation Project
Publisher: Fultus Corporation
Relase: 2010-07
ISBN: 9781596822146
GET BOOK

Ghana Business Guide

Ghana Business Guide
Author: Anonim
Publisher: Unknown
Relase: 1969
ISBN: STANFORD:36105071029610
GET BOOK

Legume Research

Legume Research
Author: Anonim
Publisher: Unknown
Relase: 2006
ISBN: CORNELL:31924101590044
GET BOOK