A consultant to Kernel Exploitation: Attacking the middle discusses the theoretical ideas and ways had to improve trustworthy and potent kernel-level exploits, and applies them to assorted working platforms, particularly, UNIX derivatives, Mac OS X, and home windows. thoughts and strategies are offered categorically in order that even if a particularly unique vulnerability has been patched, the foundational info supplied can assist hackers in writing a more recent, greater assault; or aid pen testers, auditors, and so forth increase a extra concrete layout and protective constitution.
The ebook is prepared into 4 components. half I introduces the kernel and units out the theoretical foundation on which to construct the remainder of the ebook. half II makes a speciality of varied working structures and describes exploits for them that concentrate on quite a few computer virus periods. half III on distant kernel exploitation analyzes the results of the distant state of affairs and offers new innovations to focus on distant matters. It incorporates a step by step research of the advance of a competent, one-shot, distant take advantage of for a true vulnerabilitya malicious program affecting the SCTP subsystem present in the Linux kernel. ultimately, half IV wraps up the research on kernel exploitation and appears at what the long run could hold.
- Covers a number working approach households ― UNIX derivatives, Mac OS X, Windows
- Details universal eventualities equivalent to regularly occurring reminiscence corruption (stack overflow, heap overflow, etc.) concerns, logical insects and race conditions
- Delivers the reader from user-land exploitation to the realm of kernel-land (OS) exploits/attacks, with a specific specialize in the stairs that bring about the production of winning options, that allows you to supply to the reader whatever greater than only a set of tricks