Language:
English
繁體中文
Help
回圖書館
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
A guide to kernel exploitation = att...
~
Massimiliano, Oldani.
A guide to kernel exploitation = attacking the core /
Record Type:
Electronic resources : Monograph/item
Title/Author:
A guide to kernel exploitation/ Enrico Perla, Massimiliano Oldani.
Reminder of title:
attacking the core /
Author:
Perla, Enrico.
other author:
Massimiliano, Oldani.
Published:
Burlington, MA :Syngress, : c2010.,
Description:
1 online resource.
Subject:
Operating systems (Computers) - Security measures. -
Online resource:
http://www.sciencedirect.com/science/book/9781597494861
ISBN:
9781597494861
A guide to kernel exploitation = attacking the core /
Perla, Enrico.
A guide to kernel exploitation
attacking the core /[electronic resource] :Enrico Perla, Massimiliano Oldani. - Burlington, MA :Syngress,c2010. - 1 online resource.
Includes bibliographical references and index.
Part I: A Journey to Kernel-Land -- Part II: The UNIX Family, Mac OS X, and Windows -- Part III: Remote Kernel Exploitation -- Part IV: Final Words.
"A very interesting book that not only exposes readers to kernel exploitation techniques, but also deeply motivates the study of operating systems internals, moving such study far beyond simple curiosity."--Golden G. Richard III, Ph. D., Professor of Computer Science, University of New Orleans and CTO, Digital Forensics Solutions, LLC The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop reliable and effective kernel level exploits and applies them to different operating systems (UNIX derivatives, Mac OS X, and Windows). Kernel exploits require both art and science to achieve. Every OS has its quirks and so every exploit must be molded to fully exploit its target. This book discusses the most popular OS families-UNIX derivatives, Mac OS X, and Windows-and how to gain complete control over them. Concepts and tactices are presented categorically so that even when a specifically detailed exploit has been patched, the foundational information that you have read will help you to write a newer, better attack or a more concrete design and defensive structure. Covers a range of operating system families - UNIX derivatives, Mac OS X, Windows Details common scenarios such as generic memory corruption (stack overflow, heap overflow, etc.) issues, logical bugs and race conditions Delivers the reader from user-land exploitation to the world of kernel-land (OS) exploits/attacks, with a particular focus on the steps that lead to the creation of successful techniques, in order to give to the reader something more than just a set of tricks Covers a range of operating system families - UNIX derivatives, Mac OS X, Windows Details common scenarios such as generic memory corruption (stack overflow, heap overflow, etc.) issues, logical bugs and race conditions Delivers the reader from user-land exploitation to the world of kernel-land (OS) exploits/attacks, with a particular focus on the steps that lead to the creation of successful techniques, in order to give to the reader something more than just a set of tricks.
ISBN: 9781597494861
Source: 1057637:10580031Elsevier Science & Technologyhttp://www.sciencedirect.comSubjects--Topical Terms:
323128
Operating systems (Computers)
--Security measures.Index Terms--Genre/Form:
96803
Electronic books.
LC Class. No.: QA76.76.O63 / P5168 2010
Dewey Class. No.: 005.8
A guide to kernel exploitation = attacking the core /
LDR
:03730cmm 2200337Ia 4500
001
166305
003
OCoLC
005
20111122085747.0
006
m d
007
cr cn|||||||||
008
160302s2010 mau ob 001 0 eng d
020
$a
9781597494861
020
$a
1597494860
029
1
$a
NZ1
$b
13642354
035
$a
(OCoLC)668210511
035
$a
ocn668210511
037
$a
1057637:10580031
$b
Elsevier Science & Technology
$n
http://www.sciencedirect.com
040
$a
OPELS
$b
eng
$c
OPELS
$d
CDX
$d
OCLCQ
049
$a
TEFA
050
4
$a
QA76.76.O63
$b
P5168 2010
082
0 4
$a
005.8
$2
22
100
1
$a
Perla, Enrico.
$3
323126
245
1 2
$a
A guide to kernel exploitation
$h
[electronic resource] :
$b
attacking the core /
$c
Enrico Perla, Massimiliano Oldani.
260
$a
Burlington, MA :
$c
c2010.
$b
Syngress,
300
$a
1 online resource.
504
$a
Includes bibliographical references and index.
505
0
$a
Part I: A Journey to Kernel-Land -- Part II: The UNIX Family, Mac OS X, and Windows -- Part III: Remote Kernel Exploitation -- Part IV: Final Words.
520
$a
"A very interesting book that not only exposes readers to kernel exploitation techniques, but also deeply motivates the study of operating systems internals, moving such study far beyond simple curiosity."--Golden G. Richard III, Ph. D., Professor of Computer Science, University of New Orleans and CTO, Digital Forensics Solutions, LLC The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop reliable and effective kernel level exploits and applies them to different operating systems (UNIX derivatives, Mac OS X, and Windows). Kernel exploits require both art and science to achieve. Every OS has its quirks and so every exploit must be molded to fully exploit its target. This book discusses the most popular OS families-UNIX derivatives, Mac OS X, and Windows-and how to gain complete control over them. Concepts and tactices are presented categorically so that even when a specifically detailed exploit has been patched, the foundational information that you have read will help you to write a newer, better attack or a more concrete design and defensive structure. Covers a range of operating system families - UNIX derivatives, Mac OS X, Windows Details common scenarios such as generic memory corruption (stack overflow, heap overflow, etc.) issues, logical bugs and race conditions Delivers the reader from user-land exploitation to the world of kernel-land (OS) exploits/attacks, with a particular focus on the steps that lead to the creation of successful techniques, in order to give to the reader something more than just a set of tricks Covers a range of operating system families - UNIX derivatives, Mac OS X, Windows Details common scenarios such as generic memory corruption (stack overflow, heap overflow, etc.) issues, logical bugs and race conditions Delivers the reader from user-land exploitation to the world of kernel-land (OS) exploits/attacks, with a particular focus on the steps that lead to the creation of successful techniques, in order to give to the reader something more than just a set of tricks.
588
$a
Description based on print version record.
650
0
$a
Operating systems (Computers)
$x
Security measures.
$3
323128
650
0
$a
Computer security.
$3
86565
655
4
$a
Electronic books.
$2
local.
$3
96803
700
1
$a
Massimiliano, Oldani.
$3
323127
776
0 8
$i
Print version:
$a
Perla, Enrico.
$t
Guide to kernel exploitation.
$d
Burlington, MA : Syngress, c2010
$z
9781597494861
$w
(DLC) 2010027939
$w
(OCoLC)432982310
856
4 0
$3
ScienceDirect
$u
http://www.sciencedirect.com/science/book/9781597494861
938
$a
Coutts Information Services
$b
COUT
$n
16426813
$c
49.95 USD
994
$a
C0
$b
TEF
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login