A Guide to Kernel Exploitation : Attacking the Core


Enrico. Perla
Bok Engelsk 2010 · Electronic books.
Annen tittel
Utgitt
Burlington : : Elsevier Science, , 2010.
Omfang
1 online resource (465 p.)
Opplysninger
Description based upon print version of record.. - CONTENTS; Foreword; Preface; Acknowledgments; About the Authors; About the Technical Editor; PART I: A JOURNEY TO KERNEL LAND; CHAPTER 1 From User-Land to Kernel-Land Attacks; CHAPTER 2 A Taxonomy of Kernel Vulnerabilities; CHAPTER 3 Stairway to Successful Kernel Exploitation; PART II: THE UNIX FAMILY, MAC OS X, AND WINDOWS; CHAPTER 4 The UNIX Family; CHAPTER 5 Mac OS X; CHAPTER 6 Windows; PART III: REMOTE KERNEL EXPLOITATION; CHAPTER 7 Facing the Challenges of RemoteKernel Exploitation; CHAPTER 8 Putting It All Together: A Linux Case Study; PART IV: FINAL WORDS. - CHAPTER 9 Kernel Evolution: Future Forms of Attackand DefenseIndex. - The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits and applies them to different operating systems (Linux, Solaris, Mac OS X, and Windows). Kernel exploits require both art and science to achieve. Every OS has its quirks and so every exploit must be molded to full
Emner
Sjanger
Dewey
ISBN
1597494860. - 9781597494861

Bibliotek som har denne