A Guide to Kernel Exploitation Attacking the Core discusses the theoretical techniques & approaches needed to develop reliable & effective kernel-level exploits & applies them to different operating systems namely UNIX derivatives Mac OS X & Windows Concepts & tactics are presented categorically so that even when a specifically detailed vulnerability has been patched the foundational information provided will help hackers in writing a newer better attack; or help pen testers auditors & the like develop a more concrete design & defensive structure The book is organized into four parts Part I introduces the kernel & sets out the theoretical basis on which to build the rest of the book Part II focuses on different operating systems & describes exploits for them that target various bug classes Part III on remote kernel exploitation analyzes the effects of the remote scenario & presents new techniques to target remote issues It
Includes:: a step-by-step analysis of the development of a reliable one-shot remote exploit for a real vulnerabilitya bug affecting the SCTP subsystem found in the Linux kernel Finally Part IV wraps up the analysis on kernel exploitation & looks at what the future may hold