By Enrico Perla B.Sc. Computer Science University of Torino M.Sc. Computer Science Trinity College Dublin, Massimiliano Oldani
A advisor to Kernel Exploitation: Attacking the middle discusses the theoretical recommendations and methods had to improve trustworthy and potent kernel-level exploits, and applies them to various working structures, particularly, UNIX derivatives, Mac OS X, and home windows. thoughts and strategies are awarded categorically in order that even if a in particular unique vulnerability has been patched, the foundational info supplied can help hackers in writing a more moderen, larger assault; or support pen testers, auditors, etc improve a extra concrete layout and shielding constitution.
The booklet is equipped into 4 components. half I introduces the kernel and units out the theoretical foundation on which to construct the remainder of the booklet. half II specializes in diverse working structures and describes exploits for them that focus on numerous computer virus sessions. half III on distant kernel exploitation analyzes the results of the distant state of affairs and provides new recommendations to focus on distant concerns. It contains a step by step research of the improvement of a competent, one-shot, distant make the most for a true vulnerabilitya computer virus affecting the SCTP subsystem present in the Linux kernel. eventually, half IV wraps up the research on kernel exploitation and appears at what the longer term could hold.
- Covers various working approach households ― UNIX derivatives, Mac OS X, Windows
- Details universal situations akin to typical reminiscence corruption (stack overflow, heap overflow, etc.) concerns, logical insects and race conditions
- Delivers the reader from user-land exploitation to the realm of kernel-land (OS) exploits/attacks, with a selected specialise in the stairs that bring about the construction of profitable suggestions, with a view to supply to the reader anything greater than only a set of tricks