Text
A guide to kernel exploitation : attacking the core
pt. I A JOURNEY TO KERNEL LAND
ch. 1 From User-Land to Kernel-Land Attacks
Introduction
Introducing the Kernel and the World of Kernel Exploitation
Why Doesn't My User-Land Exploit Work Anymore?
An Exploit Writer's View of the Kernel
User-Land Processes and the Scheduler
Open Source versus Closed Source Operating Systems
ch. 2 A Taxonomy of Kernel Vulnerabilities
Uninitialized/Nonvalidated/Corrupted Pointer Dereference
Memory Corruption Vulnerabilities
Integer Issues
Race Conditions
Logic Bugs (a.k.a. the Bug Grab Bag)
ch. 3 Stairway to Successful Kernel Exploitation
A Look at the Architecture Level
The Execution Step
The Triggering Step
The Information-Gathering Step
pt. II THE UNIX FAMILY, MAC OS X, AND WINDOWS
ch. 4 The UNIX Family
The Members of the UNIX Family
The execution step
Practical UNIX exploitatin
ch. 5 Mac OS X
An Overview of XNU
Kernel extention steps
Kernel Debugging
Kernel Extensions (Kext)
The execution step
Exploitation Notes
ch. 6 Windows
Windows Kernel Overview
Kernel Information Gathering
Introducing DVWD: Damn Vulnerable Windows Driver
Kernel Internals Walkthrough
Windows Authorization Model
Building the Shellcode
Practical Windows Exploitation
Arbitrary memory overwrite
Stack Buffer Overflow
pt. III REMOTE KERNEL EXPLOITATION
ch. 7 Facing the Challenges of Remote Kernel Exploitation
Attacking Remote Vulnerabilities
Executing the First Instruction
Remote Payloads
ch. 8 Putting it All Together: A Linux Case Study
SCTP FWD Chunk Heap Memory Corruption
Remote Exploitation: An Overall Analysis
Getting the Arbitrary Memory Overwrite Primitive
Installing the Shellcode
Executing the Shellcode
pt. IV FINAL WORDS
ch. 9 Kernel Evolution: Future Forms of Attack and Defense
Kernel Attacks
Confidentiality
Integrity
Availability
Kernel Defense
Kernel Threat Analysis and Modeling
Kernel Defense Mechanisms
Kernel Assurance
Beyond Kernel Bugs: Virtualization
Hypervisor Security
Guest Kernel Security
No other version available