A Guide to Kernel Exploitation

  • Author : Enrico Perla
  • Publsiher : Elsevier
  • Release : 28 October 2010
  • ISBN : 1597494879
  • Page : 464 pages
  • Rating : 5/5 from 1 voters

Download or read online book entitled A Guide to Kernel Exploitation written by Enrico Perla and published by Elsevier. This book was released on 28 October 2010 with total page 464 pages. Available in PDF, EPUB and Kindle. Get best books that you want by click Get Book Button and Read as many books as you like. Book Excerpt : A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits, and applies them to different operating systems, namely, UNIX derivatives, Mac OS X, and Windows. Concepts and tactics are presented categorically so that even when a specifically detailed vulnerability has been patched, the foundational information provided will help hackers in writing a newer, better attack; or help pen testers, auditors, and the like develop a more concrete design and defensive structure. The book is organized into four parts. Part I introduces the kernel and sets out the theoretical basis on which to build the rest of the book. Part II focuses on different operating systems and describes exploits for them that target various bug classes. Part III on remote kernel exploitation analyzes the effects of the remote scenario and presents new techniques to target remote issues. It includes a step-by-step analysis of the development of a reliable, one-shot, remote exploit for a real vulnerabilitya bug affecting the SCTP subsystem found in the Linux kernel. Finally, Part IV wraps up the analysis on kernel exploitation and looks at what the future may hold. Covers a range of operating system families — UNIX derivatives, Mac OS X, Windows Details common scenarios such as generic memory corruption (stack overflow, heap overflow, etc.) issues, logical bugs and race conditions Delivers the reader from user-land exploitation to the world of kernel-land (OS) exploits/attacks, with a particular focus on the steps that lead to the creation of successful techniques, in order to give to the reader something more than just a set of tricks

A Guide to Kernel Exploitation

A Guide to Kernel Exploitation
Author: Enrico Perla,Massimiliano Oldani
Publisher: Elsevier
Relase: 2010-10-28
ISBN: 1597494879
GET BOOK

The Art of Memory Forensics

The Art of Memory Forensics
Author: Michael Hale Ligh,Andrew Case,Jamie Levy,AAron Walters
Publisher: John Wiley & Sons
Relase: 2014-07-22
ISBN: 9781118824993
GET BOOK

The Hacker s Guide to OS X

The Hacker s Guide to OS X
Author: Robert Bathurst,Russ Rogers,Alijohn Ghassemlouei
Publisher: Newnes
Relase: 2012-12-31
ISBN: 9781597499545
GET BOOK

The Rootkit Arsenal

The Rootkit Arsenal
Author: Bill Blunden
Publisher: Jones & Bartlett Publishers
Relase: 2013
ISBN: 9781449626365
GET BOOK

Cyber Deception

Cyber Deception
Author: Sushil Jajodia,V.S. Subrahmanian,Vipin Swarup,Cliff Wang
Publisher: Springer
Relase: 2016-07-15
ISBN: 9783319326993
GET BOOK

Dynamically Enabled Cyber Defense

Dynamically Enabled Cyber Defense
Author: Lin Yang,Quan Yu
Publisher: World Scientific
Relase: 2021-06-08
ISBN: 9789811234354
GET BOOK

The Basics of Hacking and Penetration Testing

The Basics of Hacking and Penetration Testing
Author: Patrick Engebretson
Publisher: Elsevier
Relase: 2011-07-21
ISBN: 1597496561
GET BOOK

Advances in Social Simulation

Advances in Social Simulation
Author: Petra Ahrweiler
Publisher: Springer Nature
Relase: 2021-09-26
ISBN: 9783030615031
GET BOOK

IBM z15 8561 Technical Guide

IBM z15  8561  Technical Guide
Author: Octavian Lascu,John Troy,Jannie Houlbjerg,Frank Packheiser,Paul Schouten,Kazuhiro Nakajima,Anna Shugol,Hervey Kamga,Bo XU,IBM Redbooks
Publisher: IBM Redbooks
Relase: 2021-04-28
ISBN: 9780738458120
GET BOOK

Hands On Penetration Testing on Windows

Hands On Penetration Testing on Windows
Author: Phil Bramwell
Publisher: Packt Publishing Ltd
Relase: 2018-07-30
ISBN: 9781788295093
GET BOOK

Detection of Intrusions and Malware and Vulnerability Assessment

Detection of Intrusions and Malware  and Vulnerability Assessment
Author: Clémentine Maurice
Publisher: Springer Nature
Relase: 2021-09-26
ISBN: 9783030526832
GET BOOK

CEH v10 Certified Ethical Hacker Study Guide

CEH v10 Certified Ethical Hacker Study Guide
Author: Ric Messier
Publisher: John Wiley & Sons
Relase: 2019-06-25
ISBN: 9781119533191
GET BOOK

CEH v11 Certified Ethical Hacker Study Guide

CEH v11 Certified Ethical Hacker Study Guide
Author: Ric Messier
Publisher: John Wiley & Sons
Relase: 2021-07-16
ISBN: 9781119800309
GET BOOK

Ethical Hacking and Penetration Testing Guide

Ethical Hacking and Penetration Testing Guide
Author: Rafay Baloch
Publisher: CRC Press
Relase: 2017-09-29
ISBN: 9781482231625
GET BOOK

CISSP Study Guide

CISSP Study Guide
Author: Eric Conrad,Seth Misenar,Joshua Feldman
Publisher: Syngress
Relase: 2015-12-08
ISBN: 9780128028209
GET BOOK