Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of A guide to kernel exploitation : attacking the core
Bookmark Share

Text

A guide to kernel exploitation : attacking the core

Perla, Enrico - Personal Name; Massimiliano, Oldani - Personal Name;

pt. I A JOURNEY TO KERNEL LAND

ch. 1 From User-Land to Kernel-Land Attacks
Introduction
Introducing the Kernel and the World of Kernel Exploitation
Why Doesn't My User-Land Exploit Work Anymore?
An Exploit Writer's View of the Kernel
User-Land Processes and the Scheduler
Open Source versus Closed Source Operating Systems

ch. 2 A Taxonomy of Kernel Vulnerabilities
Uninitialized/​Nonvalidated/​Corrupted Pointer Dereference
Memory Corruption Vulnerabilities
Integer Issues
Race Conditions
Logic Bugs (a.k.a. the Bug Grab Bag)

ch. 3 Stairway to Successful Kernel Exploitation
A Look at the Architecture Level
The Execution Step
The Triggering Step
The Information-Gathering Step

pt. II THE UNIX FAMILY, MAC OS X, AND WINDOWS

ch. 4 The UNIX Family
The Members of the UNIX Family
The execution step
Practical UNIX exploitatin

ch. 5 Mac OS X
An Overview of XNU
Kernel extention steps
Kernel Debugging
Kernel Extensions (Kext)
The execution step
Exploitation Notes

ch. 6 Windows
Windows Kernel Overview
Kernel Information Gathering
Introducing DVWD: Damn Vulnerable Windows Driver
Kernel Internals Walkthrough
Windows Authorization Model
Building the Shellcode
Practical Windows Exploitation
Arbitrary memory overwrite
Stack Buffer Overflow

pt. III REMOTE KERNEL EXPLOITATION

ch. 7 Facing the Challenges of Remote Kernel Exploitation
Attacking Remote Vulnerabilities
Executing the First Instruction
Remote Payloads

ch. 8 Putting it All Together: A Linux Case Study
SCTP FWD Chunk Heap Memory Corruption
Remote Exploitation: An Overall Analysis
Getting the Arbitrary Memory Overwrite Primitive
Installing the Shellcode
Executing the Shellcode

pt. IV FINAL WORDS
ch. 9 Kernel Evolution: Future Forms of Attack and Defense
Kernel Attacks
Confidentiality
Integrity
Availability
Kernel Defense
Kernel Threat Analysis and Modeling
Kernel Defense Mechanisms
Kernel Assurance
Beyond Kernel Bugs: Virtualization
Hypervisor Security
Guest Kernel Security


Availability
#
Perpustakaan Poltek SSN (Rak 000) 005.8 PER g
b0001359
Available - Available
Detail Information
Series Title
--
Call Number
005.8 PER g
Publisher
Massachusetts : Syngress., 2011
Collation
xxi, 442 hal.; ilus.; 24 cm
Language
English
ISBN/ISSN
9781597494861
Classification
005.8
Content Type
-
Media Type
-
Carrier Type
-
Edition
--
Subject(s)
Operating systems (Computers) -- Security measure
Computer security
Specific Detail Info
--
Statement of Responsibility
Enrico Perla and Massimiliano Oldani
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?