A Guide to Kernel Exploitation: Attacking the Core (Paperback)
暫譯: 內核利用指南:攻擊核心 (平裝本)
Enrico Perla B.Sc. Computer Science University of Torino M.Sc. Computer Science Trinity College Dublin, Massimiliano Oldani
- 出版商: Syngress Media
- 出版日期: 2010-09-15
- 定價: $1,750
- 售價: 8.0 折 $1,400
- 語言: 英文
- 頁數: 442
- 裝訂: Paperback
- ISBN: 1597494860
- ISBN-13: 9781597494861
-
相關分類:
資訊安全
立即出貨 (庫存=1)
買這商品的人也買了...
-
$2,831The Design of the UNIX Operating System (Paperback)
-
$1,940$1,843 -
$490$382 -
$530$419 -
$2,050$1,948 -
$2,050$1,948 -
$530$419 -
$680$537 -
$520$411 -
$1,140iPhone Game Development: Developing 2D & 3D games in Objective-C (Paperback)
-
$890$757 -
$490$387 -
$959Professional Android 2 Application Development (Paperback)
-
$490$417 -
$450$351 -
$2,120$2,014 -
$420$357 -
$550$435 -
$420$332 -
$580$458 -
$1,683Digital Forensics with Open Source Tools (Paperback)
-
$2,050$1,948 -
$580$452 -
$480$408 -
$550$468
商品描述
The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits and applies them to different operating systems (Linux, Solaris, Mac OS X, and Windows). Kernel exploits require both art and science to achieve. Every OS has its quirks and so every exploit must be molded to fully exploit its target. This book discusses the most popular OS families-UNIX derivatives, Mac OS X, and Windows-and how to gain complete control over them. Concepts and tactics are presented categorically so that even when a specifically detailed exploit has been patched, the foundational information that you have read will help you to write a newer, better attack or a more concrete design and defensive structure.
- Covers a range of operating system families - UNIX derivatives, Mac OS X, Windows
- Details common scenarios such as generic memory corruption (stack overflow, heap overflow, etc.) issues, logical bugs and race conditions
- Delivers the reader from user-land exploitation to the world of kernel-land (OS) exploits/attacks, with a particular focus on the steps that lead to the creation of successful techniques, in order to give to the reader something more than just a set of tricks
商品描述(中文翻譯)
使用者空間(user-land)對抗利用(exploitation)的安全對策數量正在增加。因此,內核利用(kernel exploitation)在利用編寫者和攻擊者中變得越來越受歡迎。玩弄操作系統的核心是一場危險的遊戲:本書涵蓋了開發可靠且有效的內核級利用所需的理論技術和方法,並將其應用於不同的操作系統(Linux、Solaris、Mac OS X 和 Windows)。內核利用需要藝術與科學的結合才能實現。每個操作系統都有其特性,因此每個利用必須根據其目標進行調整。本書討論了最受歡迎的操作系統家族——UNIX 衍生版、Mac OS X 和 Windows,以及如何完全控制它們。概念和戰術以類別方式呈現,即使某個具體的利用已被修補,您所閱讀的基礎信息也將幫助您撰寫更新、更好的攻擊或更具體的設計和防禦結構。
- 涵蓋多種操作系統家族 - UNIX 衍生版、Mac OS X、Windows
- 詳細說明常見場景,例如通用記憶體損壞(堆疊溢位、堆溢位等)問題、邏輯錯誤和競爭條件
- 引導讀者從使用者空間利用進入內核空間(OS)利用/攻擊的世界,特別關注導致成功技術創建的步驟,以便給讀者提供的不僅僅是一套技巧