Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your email address or mobile phone number.
"A very interesting book that not only exposes readers to kernel exploitation techniques, but also deeply motivates the study of operating systems internals, moving such study far beyond simple curiosity."--Golden G. Richard III, Ph.D., Professor of Computer Science, University of New Orleans and CTO, Digital Forensics Solutions, LLC
The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits and applies them to different operating systems (Linux, Solaris, Mac OS X, and Windows). Kernel exploits require both art and science to achieve. Every OS has its quirks and so every exploit must be molded to fully exploit its target. This book discusses the most popular OS families―UNIX derivatives, Mac OS X, and Windows―and how to gain complete control over them. Concepts and tactics are presented categorically so that even when a specifically detailed exploit has been patched, the foundational information that you have read will help you to write a newer, better attack or a more concrete design and defensive structure.
This book is the best book I've ever read. No, but seriously, its like the keys to the kingdom. The authors do a great job of giving you a foundation in the starting chapters... Read morePublished 12 months ago by Duderino
The authors do a good job of laying out the details kernel exploitation. The only reason I am dropping a star is because they do not discuss mobile platforms at all and... Read morePublished on April 16, 2013 by Mike
I am just getting into the kernel land programming, hoping to find useful information in the book to enhance my understanding of the nature of some of attacks. Read morePublished on May 22, 2012 by kuma
A challenge in a book such as this is how much to assume the reader knows. Is the reader familiar with the OS internals and APIs, does the reader know how compilers generate code... Read morePublished on May 20, 2012 by T. Burket
WARNING: Don't read this book if you would prefer to remain blissfully ignorant of just how vulnerable computer operating systems are to compromise. Read morePublished on May 19, 2012 by D. Baer
A Guide to Kernel Exploitation: Attacking the Core guides the developer or hacker in how to protect or exploit weaknesses in the kernel of Linux, Mac OS X and Windows. Read morePublished on May 17, 2012 by Patrick Regan
I learned a lot from this book. I'm not a professional programmer, but I have worked in computer security and the broader IT industry. Read morePublished on April 9, 2012 by Kristi Gilleland
A Guide to Kernel Exploitation: Attacking the Core is a great technically focused treatment of the topic. It is not written for the absolute beginner. Read morePublished on March 14, 2012 by Mark
As I've said in a previous review, I've long since been interested in computer security, but have only recently started studying it. Read morePublished on March 15, 2011 by ut158