25 Books to Read Before You Die
 
 

Recently Viewed clear list


Original Essays | August 18, 2014

Ian Leslie: IMG Empathic Curiosity



Today, we wonder anxiously if digital media is changing our brains. But if there's any time in history when our mental operations changed... Continue »
  1. $18.89 Sale Hardcover add to wish list

spacer
Qualifying orders ship free.
$61.75
New Trade Paper
Ships in 1 to 3 days
Add to Wishlist
available for shipping or prepaid pickup only
Available for In-store Pickup
in 7 to 12 days
Qty Store Section
25 Remote Warehouse Networking- Computer Security

More copies of this ISBN

A Guide to Kernel Exploitation: Attacking the Core

by

A Guide to Kernel Exploitation: Attacking the Core Cover

 

Synopses & Reviews

Publisher Comments:

The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits and applies them to different operating systems (Linux, Solaris, Mac OS X, and Windows). Kernel exploits require both art and science to achieve. Every OS has its quirks and so every exploit must be molded to fully exploit its target. This book discusses the most popular OS families-UNIX derivatives, Mac OS X, and Windows-and how to gain complete control over them. Concepts and tactics are presented categorically so that even when a specifically detailed exploit has been patched, the foundational information that you have read will help you to write a newer, better attack or a more concrete design and defensive structure.

  • Covers a range of operating system families - UNIX derivatives, Mac OS X, Windows
  • Details common scenarios such as generic memory corruption (stack overflow, heap overflow, etc.) issues, logical bugs and race conditions
  • Delivers the reader from user-land exploitation to the world of kernel-land (OS) exploits/attacks, with a particular focus on the steps that lead to the creation of successful techniques, in order to give to the reader something more than just a set of tricks

 

Synopsis:

Learn how kernel exploits expose operating system vulnerabilities and give the attacker complete control!

About the Author

Enrico Perla currently works as a kernel programmer at Oracle. He received his B.Sc. in Computer Science from the University of Torino, and his M.Sc. in Computer Science from Trinity College Dublin. His interests range from low-level system programming to low-level system attacking, exploiting, and exploit countermeasures.Massimiliano Oldani currently works as a Security Consultant at Emaze Networks. His main research topics include operating system security and kernel vulnerabilities.

Security Consultant, Emaze Networks

Table of Contents

Part I: A Journey to Kernel-Land Chapter 1: From User-Land to Kernel-Land Attacks Chapter 2: A Taxonomy of Kernel Vulnerabilities Chapter 3: Stairway to Successful Kernel Exploitation Part II: The UNIX Family, Mac OS X, and Windows Chapter 4: The UNIX Family Chapter 5: Mac OS X Chapter 6: Windows Part III: Remote Kernel Exploitation Chapter 7: Facing the Challenges of Remote Kernel Exploitation Chapter 8: Putting It All Together: A Linux Case Study Part IV: Final Words Chapter 9: Kernel Evolution: Future Forms of Attack and Defense 

Product Details

ISBN:
9781597494861
Author:
Perla, Enrico
Publisher:
Syngress Publishing
Author:
Oldani, Massimiliano
Subject:
Security - General
Subject:
Security
Subject:
Networking-Computer Security
Publication Date:
20100931
Binding:
TRADE PAPER
Language:
English
Pages:
464
Dimensions:
9.25 x 7.5 in

Related Subjects

Children's » General
Computers and Internet » Internet » Hackers
Computers and Internet » Networking » Computer Security
Science and Mathematics » Chemistry » Chemical Engineering

A Guide to Kernel Exploitation: Attacking the Core New Trade Paper
0 stars - 0 reviews
$61.75 In Stock
Product details 464 pages Syngress Publishing - English 9781597494861 Reviews:
"Synopsis" by , Learn how kernel exploits expose operating system vulnerabilities and give the attacker complete control!
spacer
spacer
  • back to top
Follow us on...




Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.