Fr. 67.00

A Guide to Kernel Exploitation - Attacking the Core print on demand

English · Hardback

Shipping usually takes at least 4 weeks (title will be specially ordered)

Description

Read more

Informationen zum Autor Enrico Perla currently works as a kernel programmer at Oracle. He received his B.Sc. in Computer Science from the University of Torino, and his M.Sc. in Computer Science from Trinity College Dublin. His interests range from low-level system programming to low-level system attacking, exploiting, and exploit countermeasures. Klappentext Covers the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits and applies them to different operating systems (Linux, Solaris, Mac OS X, and Windows). This title discusses the most popular OS families - UNIX derivatives, Mac OS X, and Windows - and how to gain complete control over them. Zusammenfassung Covers the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits and applies them to different operating systems (Linux! Solaris! Mac OS X! and Windows). This title discusses the most popular OS families - UNIX derivatives! Mac OS X! and Windows - and how to gain complete control over them. Inhaltsverzeichnis Part I: A Journey to Kernel-Land 1. From User-Land to Kernel-Land Attacks 2. A Taxonomy of Kernel Vulnerabilities 3. Stairway to Successful Kernel Exploitation Part II: The UNIX Family, Mac OS X, and Windows 4. The UNIX Family 5. Mac OS X 6. Windows Part III: Remote Kernel Exploitation 7. Facing the Challenges of Remote Kernel Exploitation 8. Putting It All Together: A Linux Case Study Part IV: Final Words 9. Kernel Evolution: Future Forms of Attack and Defense

List of contents

Part I: A Journey to Kernel-Land
1. From User-Land to Kernel-Land Attacks
2. A Taxonomy of Kernel Vulnerabilities
3. Stairway to Successful Kernel Exploitation

Part II: The UNIX Family, Mac OS X, and Windows
4. The UNIX Family
5. Mac OS X
6. Windows

Part III: Remote Kernel Exploitation
7. Facing the Challenges of Remote Kernel Exploitation
8. Putting It All Together: A Linux Case Study

Part IV: Final Words
9. Kernel Evolution: Future Forms of Attack and Defense

Report

"A very interesting book that not only exposes readers to kernel exploitation techniques, but also deeply motivates the study of operating systems internals, moving such study far beyond simple curiosity."--Golden G. Richard III, Ph.D., Professor of Computer Science, University of New Orleans and CTO, Digital Forensics Solutions, LLC

Product details

Authors Massimiliano Oldani, Massimiliano (Security Consultant Oldani, Enrico Perla, Enrico (Kernel Programmer Perla, Enrico/ Oldani Perla
Publisher Syngress
 
Languages English
Product format Hardback
Released 12.11.2010
 
EAN 9781597494861
ISBN 978-1-59749-486-1
Dimensions 193 mm x 237 mm x 23 mm
Subject Natural sciences, medicine, IT, technology > IT, data processing > IT

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.