skip to content
A guide to kernel exploitation : attacking the core Preview this item
ClosePreview this item
Checking...

A guide to kernel exploitation : attacking the core

Author: Enrico Perla; Oldani Massimiliano
Publisher: Burlington, MA : Syngress, ©2010.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
"A very interesting book that not only exposes readers to kernel exploitation techniques, but also deeply motivates the study of operating systems internals, moving such study far beyond simple curiosity."--Golden G. Richard III, Ph. D., Professor of Computer Science, University of New Orleans and CTO, Digital Forensics Solutions, LLC The number of security countermeasures against user-land exploitation is on the  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Perla, Enrico.
Guide to kernel exploitation.
Burlington, MA : Syngress, ©2010
(DLC) 2010027939
(OCoLC)432982310
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Enrico Perla; Oldani Massimiliano
ISBN: 9781597494861 1597494860 1282880071 9781282880078 9781597494878 1597494879
OCLC Number: 668210511
Description: 1 online resource
Contents: Part I: A Journey to Kernel-Land --
Part II: The UNIX Family, Mac OS X, and Windows --
Part III: Remote Kernel Exploitation --
Part IV: Final Words.
Responsibility: Enrico Perla, Massimiliano Oldani.

Abstract:

Covers the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits and applies them to different operating systems (Linux, Solaris, Mac OS X, and  Read more...

Reviews

Editorial reviews

Publisher Synopsis

"A very interesting book that not only exposes readers to kernel exploitation techniques, but also deeply motivates the study of operating systems internals, moving such study far beyond simple Read more...

 
User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/668210511> # A guide to kernel exploitation : attacking the core
    a schema:Book, schema:CreativeWork, schema:MediaObject ;
    library:oclcnum "668210511" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/mau> ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/803745348#Place/burlington_ma> ; # Burlington, MA
    schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
    schema:about <http://dewey.info/class/005.8/e22/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/803745348#Topic/computers_security_general> ; # COMPUTERS--Security--General
    schema:about <http://experiment.worldcat.org/entity/work/data/803745348#Topic/computers_networking_security> ; # COMPUTERS--Networking--Security
    schema:about <http://experiment.worldcat.org/entity/work/data/803745348#Topic/computers_internet_security> ; # COMPUTERS--Internet--Security
    schema:about <http://experiment.worldcat.org/entity/work/data/803745348#Topic/operating_systems_computers_security_measures> ; # Operating systems (Computers)--Security measures
    schema:about <http://id.worldcat.org/fast/1046289> ; # Operating systems (Computers)--Security measures
    schema:bookFormat schema:EBook ;
    schema:contributor <http://viaf.org/viaf/149165398> ; # Oldani Massimiliano
    schema:copyrightYear "2010" ;
    schema:creator <http://viaf.org/viaf/273288632> ; # Enrico Perla
    schema:datePublished "2010" ;
    schema:description "Part I: A Journey to Kernel-Land -- Part II: The UNIX Family, Mac OS X, and Windows -- Part III: Remote Kernel Exploitation -- Part IV: Final Words."@en ;
    schema:description ""A very interesting book that not only exposes readers to kernel exploitation techniques, but also deeply motivates the study of operating systems internals, moving such study far beyond simple curiosity."--Golden G. Richard III, Ph. D., Professor of Computer Science, University of New Orleans and CTO, Digital Forensics Solutions, LLC The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop reliable and effective kernel level exploits and applies them to different operating systems (UNIX derivatives, Mac OS X, and Windows). Kernel exploits require both art and science to achieve. Every OS has its quirks and so every exploit must be molded to fully exploit its target. This book discusses the most popular OS families-UNIX derivatives, Mac OS X, and Windows-and how to gain complete control over them. Concepts and tactices are presented categorically so that even when a specifically detailed exploit has been patched, the foundational information that you have read will help you to write a newer, better attack or a more concrete design and defensive structure. Covers a range of operating system families - UNIX derivatives, Mac OS X, Windows Details common scenarios such as generic memory corruption (stack overflow, heap overflow, etc.) issues, logical bugs and race conditions Delivers the reader from user-land exploitation to the world of kernel-land (OS) exploits/attacks, with a particular focus on the steps that lead to the creation of successful techniques, in order to give to the reader something more than just a set of tricks Covers a range of operating system families - UNIX derivatives, Mac OS X, Windows Details common scenarios such as generic memory corruption (stack overflow, heap overflow, etc.) issues, logical bugs and race conditions Delivers the reader from user-land exploitation to the world of kernel-land (OS) exploits/attacks, with a particular focus on the steps that lead to the creation of successful techniques, in order to give to the reader something more than just a set of tricks."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/803745348> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/432982310> ;
    schema:name "A guide to kernel exploitation : attacking the core"@en ;
    schema:productID "668210511" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/668210511#PublicationEvent/burlington_ma_syngress_2010> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/803745348#Agent/syngress> ; # Syngress
    schema:url <http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781597494861> ;
    schema:url <http://www.books24x7.com/marc.asp?bookid=40142> ;
    schema:url <http://www.sciencedirect.com/science/book/9781597494861> ;
    schema:url <http://public.ebookcentral.proquest.com/choice/publicfullrecord.aspx?p=629992> ;
    schema:url <http://site.ebrary.com/id/10427721> ;
    schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=344960> ;
    schema:url <http://proquest.safaribooksonline.com/9781597494861> ;
    schema:url <http://www.myilibrary.com?id=288007&ref=toc> ;
    schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=629992> ;
    schema:url <http://dproxy.library.dc-uoit.ca/login?url=https://www.sciencedirect.com/science/book/9781597494861> ;
    schema:url <http://www.myilibrary.com?id=288007> ;
    schema:workExample <http://worldcat.org/isbn/9781597494878> ;
    schema:workExample <http://worldcat.org/isbn/9781597494861> ;
    schema:workExample <http://worldcat.org/isbn/9781282880078> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/668210511> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/803745348#Place/burlington_ma> # Burlington, MA
    a schema:Place ;
    schema:name "Burlington, MA" ;
    .

<http://experiment.worldcat.org/entity/work/data/803745348#Topic/computers_internet_security> # COMPUTERS--Internet--Security
    a schema:Intangible ;
    schema:name "COMPUTERS--Internet--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/803745348#Topic/computers_networking_security> # COMPUTERS--Networking--Security
    a schema:Intangible ;
    schema:name "COMPUTERS--Networking--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/803745348#Topic/computers_security_general> # COMPUTERS--Security--General
    a schema:Intangible ;
    schema:name "COMPUTERS--Security--General"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/803745348#Topic/operating_systems_computers_security_measures> # Operating systems (Computers)--Security measures
    a schema:Intangible ;
    schema:hasPart <http://id.loc.gov/authorities/subjects/sh85094982> ;
    schema:name "Operating systems (Computers)--Security measures"@en ;
    .

<http://id.worldcat.org/fast/1046289> # Operating systems (Computers)--Security measures
    a schema:Intangible ;
    schema:name "Operating systems (Computers)--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://viaf.org/viaf/149165398> # Oldani Massimiliano
    a schema:Person ;
    schema:familyName "Massimiliano" ;
    schema:givenName "Oldani" ;
    schema:name "Oldani Massimiliano" ;
    .

<http://viaf.org/viaf/273288632> # Enrico Perla
    a schema:Person ;
    schema:familyName "Perla" ;
    schema:givenName "Enrico" ;
    schema:name "Enrico Perla" ;
    .

<http://worldcat.org/isbn/9781282880078>
    a schema:ProductModel ;
    schema:isbn "1282880071" ;
    schema:isbn "9781282880078" ;
    .

<http://worldcat.org/isbn/9781597494861>
    a schema:ProductModel ;
    schema:isbn "1597494860" ;
    schema:isbn "9781597494861" ;
    .

<http://worldcat.org/isbn/9781597494878>
    a schema:ProductModel ;
    schema:isbn "1597494879" ;
    schema:isbn "9781597494878" ;
    .

<http://www.worldcat.org/oclc/432982310>
    a schema:CreativeWork ;
    rdfs:label "Guide to kernel exploitation." ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/668210511> ; # A guide to kernel exploitation : attacking the core
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.