Read more
Informationen zum Autor Enrico Perla currently works as a kernel programmer at Oracle. He received his B.Sc. in Computer Science from the University of Torino, and his M.Sc. in Computer Science from Trinity College Dublin. His interests range from low-level system programming to low-level system attacking, exploiting, and exploit countermeasures. Klappentext Covers the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits and applies them to different operating systems (Linux, Solaris, Mac OS X, and Windows). This title discusses the most popular OS families - UNIX derivatives, Mac OS X, and Windows - and how to gain complete control over them. Zusammenfassung Covers the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits and applies them to different operating systems (Linux! Solaris! Mac OS X! and Windows). This title discusses the most popular OS families - UNIX derivatives! Mac OS X! and Windows - and how to gain complete control over them. Inhaltsverzeichnis Part I: A Journey to Kernel-Land 1. From User-Land to Kernel-Land Attacks 2. A Taxonomy of Kernel Vulnerabilities 3. Stairway to Successful Kernel Exploitation Part II: The UNIX Family, Mac OS X, and Windows 4. The UNIX Family 5. Mac OS X 6. Windows Part III: Remote Kernel Exploitation 7. Facing the Challenges of Remote Kernel Exploitation 8. Putting It All Together: A Linux Case Study Part IV: Final Words 9. Kernel Evolution: Future Forms of Attack and Defense
List of contents
Part I: A Journey to Kernel-Land
1. From User-Land to Kernel-Land Attacks
2. A Taxonomy of Kernel Vulnerabilities
3. Stairway to Successful Kernel Exploitation
Part II: The UNIX Family, Mac OS X, and Windows
4. The UNIX Family
5. Mac OS X
6. Windows
Part III: Remote Kernel Exploitation
7. Facing the Challenges of Remote Kernel Exploitation
8. Putting It All Together: A Linux Case Study
Part IV: Final Words
9. Kernel Evolution: Future Forms of Attack and Defense
Report
"A very interesting book that not only exposes readers to kernel exploitation techniques, but also deeply motivates the study of operating systems internals, moving such study far beyond simple curiosity."--Golden G. Richard III, Ph.D., Professor of Computer Science, University of New Orleans and CTO, Digital Forensics Solutions, LLC