Sorry, this item is not available in
Image not available for
Color:
Image not available

To view this video download Flash Player

 


or
Sign in to turn on 1-Click ordering
Sell Us Your Item
For a $9.55 Gift Card
Trade in
Kindle Edition
Read instantly on your iPad, PC, Mac, Android tablet or Kindle Fire
Buy Price: $32.34
Rent From: $15.65
 
 
 
More Buying Choices
Have one to sell? Sell yours here
4.4 out of 5 stars  See all reviews (22 customer reviews)

List Price: $52.95
Price: $34.04 & FREE Shipping on orders over $35. Details
You Save: $18.91 (36%)
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Only 7 left in stock (more on the way).
Ships from and sold by Amazon.com. Gift-wrap available.
Want it tomorrow, April 25? Choose One-Day Shipping at checkout. Details
Free Two-Day Shipping for College Students with Amazon Student

Formats

Amazon Price New from Used from
 
Kindle Edition
Rent from
$32.34
$15.65
 
Paperback $34.04  
Sell Us Your Books
Get up to 80% back when you sell us your books, even if you didn't buy them at Amazon. Learn more

Book Description

September 15, 2010 1597494860 978-1597494861 1

The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits and applies them to different operating systems (Linux, Solaris, Mac OS X, and Windows). Kernel exploits require both art and science to achieve. Every OS has its quirks and so every exploit must be molded to fully exploit its target. This book discusses the most popular OS families-UNIX derivatives, Mac OS X, and Windows-and how to gain complete control over them. Concepts and tactics are presented categorically so that even when a specifically detailed exploit has been patched, the foundational information that you have read will help you to write a newer, better attack or a more concrete design and defensive structure.

  • Covers a range of operating system families - UNIX derivatives, Mac OS X, Windows
  • Details common scenarios such as generic memory corruption (stack overflow, heap overflow, etc.) issues, logical bugs and race conditions
  • Delivers the reader from user-land exploitation to the world of kernel-land (OS) exploits/attacks, with a particular focus on the steps that lead to the creation of successful techniques, in order to give to the reader something more than just a set of tricks

Frequently Bought Together

A Guide to Kernel Exploitation: Attacking the Core + The Shellcoder's Handbook: Discovering and Exploiting Security Holes + Reversing: Secrets of Reverse Engineering
Price for all three: $93.99

Buy the selected items together


Editorial Reviews

Review

"A very interesting book that not only exposes readers to kernel exploitation techniques, but also deeply motivates the study of operating systems internals, moving such study far beyond simple curiosity."--Golden G. Richard III, Ph.D., Professor of Computer Science, University of New Orleans and CTO, Digital Forensics Solutions, LLC

From the Back Cover

The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits and applies them to different operating systems (Linux, Solaris, Mac OS X, and Windows). Kernel exploits require both art and science to achieve. Every OS has its quirks and so every exploit must be molded to fully exploit its target. This book discusses the most popular OS families-UNIX derivatives, Mac OS X, and Windows-and how to gain complete control over them. Concepts and tactics are presented categorically so that even when a specifically detailed exploit has been patched, the foundational information that you have read will help you to write a newer, better attack or a more concrete design and defensive structure.


Product Details

  • Paperback: 442 pages
  • Publisher: Syngress; 1 edition (September 15, 2010)
  • Language: English
  • ISBN-10: 1597494860
  • ISBN-13: 978-1597494861
  • Product Dimensions: 9.1 x 7.4 x 1.1 inches
  • Shipping Weight: 1.8 pounds (View shipping rates and policies)
  • Average Customer Review: 4.4 out of 5 stars  See all reviews (22 customer reviews)
  • Amazon Best Sellers Rank: #511,261 in Books (See Top 100 in Books)

More About the Author

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

Most Helpful Customer Reviews
16 of 18 people found the following review helpful
5.0 out of 5 stars Readable, instructive, concise, just two caveats October 4, 2010
By DDDDDDD
Format:Paperback
My colleague showed me this book (full disclosure: he was a reviewer) - he made his students buy it it for his OS II class (assigned middle of the semester!) one week ago - hot off the presses. I got two copies, one for my office and one for reading on the bus.

It's one of three technical exploit books I'd take on a deserted, networked, powered island. Part 1: Journey into Kernel Land (Intro and explanations) is one of the most succinct clear intros I have ever seen. I wish I could distributed that as a document for class. The section on Windows is current and well done, also because the difference between 32 and 64 bit architectures and approaches are emphasized (this is not the case with Eilam's book alas, though very good) - this book is up to date. I think the Unix section needs to be updated, though, my colleague said that some of the exploits were possible in 2006/2007 but with kernel changes some APIs are not available etc. This needs to be updated. Cannot comment on the Mac section, because no expertise.

Website available and examples useful: [...]

Wishlist:

1) There are some unavoidable typos, sure: p.10: MAC is nor Media Access Control in a security context, it's Mandatory Access Control
2) I would have really really like an expanded section on hypervisors and virtualization (there is a mini epilogue on it at the end)- that would have made my day
3) The Linux case study was neat - for next version, do Windows Stuxnet's m.o. because it adds all sorts of interesting kernel root attack pathways

You will not regret buying this book - it is obvious and much appreciated that the authors put a lot of effort into making an readable guide for the medium to expert reader that can double as a textbook companion.

Daniel Bilar
CS Department
UNO
Was this review helpful to you?
7 of 7 people found the following review helpful
5.0 out of 5 stars An excellent book on kernel exploitation October 19, 2010
Format:Paperback|Verified Purchase
I bought this book in hopes of finding an informative and thought provoking look at kernel exploitation - I was not disappointed. Aside from a few minor typos, I found this book to be one of the most well written books on exploitation that I have read. I have recommended it to some fellow students and a professor (I am a graduate student in computer science). I highly recommend this book for anybody that is interested in kernel exploitation. In my opinion, this book is currently the best source of information on exploiting the kernel since Phrack #64 file 6.
Comment | 
Was this review helpful to you?
6 of 6 people found the following review helpful
5.0 out of 5 stars the new bible for kernel hackers December 30, 2010
Format:Paperback|Vine Customer Review of Free Product (What's this?)
I've read plenty of works that have covered kernel exploits at their most basic level - fill up a buffer, overwrite the stack pointer, and insert your code with a nop sled. I can't think of anything that comes close to the depth and breadth offered by this book. It starts where technical books always should but rarely do - with theory. The first part of the book deals with explaining the kernel, describing the various types of kernel exploits, and has a lengthy discussion of architectural options that may effect a kernel exploit. The second part of the book gets practical. They cover the three main classes of OS in depth - Windows, Mac, and Unix. Each kernel is discussed, its' peculiarities analyzed, tool suggestions provided, debugging explained, and numerous examples of previous kernel exploits are given. There is also a chapter on remote exploitation, and the book wraps up with a fantastic case study which ties everything together in a real world example. This is going to quickly become a staple in the library of every kernel hacker as both a reference work and educational guide.

A quick note on the technical level of the book - it assumes you know C, understand something about how kernels work, and have at least a passing familiarity with assembly. There is a lot of code in the book, all of which is helpfully on the book's website at attackingthecore.com.
Comment | 
Was this review helpful to you?
4 of 4 people found the following review helpful
5.0 out of 5 stars Great book December 23, 2010
Format:Paperback|Vine Customer Review of Free Product (What's this?)
The authors do a great job at introducing the subject. They provide a definition of what exploitation means and a rationale on why exploitations are moving from user-land to kernel-land. They then describe different categories of exploitations and provide examples taken from real code. A thorough understanding of the examples requires some programming experience but if you are looking at this book you probably have it. Some background in operating systems is also helpful even though the authors do a good job at explaining the parts of the OS that will be affected by the exploit. Once the high-level concepts have been presented, discussion moves to examples of exploitations under different OS families. If you are looking for a book that will allow you to understand the thought process involved in exploiting kernel vulnerabilities, I think this book does a great job!
Comment | 
Was this review helpful to you?
6 of 7 people found the following review helpful
Format:Paperback|Vine Customer Review of Free Product (What's this?)
While there are many crackers in the programming world, what separates the amateurs from the pros is the ability to successfully attack the bastion of security, the kernel of the operating system. The code in the kernel runs with full privilege so obviously if you can get in and run malicious code at the level of the kernel, then there is nothing else to stop it from doing whatever the cracker intends.
There are two fundamental and hopefully distinct audiences for this book. The first are the crackers that want to take their game up to the next level and prove that they can run with the big dogs when it comes to cracking systems. The second audience are the people that program operating systems kernels, by understanding the techniques used to attack the kernel, you are better able to program systems that will withstand attack.
The opening three chapters consist of explanations of the generic concepts that prepare the way for understanding how kernels can be attacked and exploited. Chapter four deals with attacks specifically on UNIX systems, chapter five with attacks on Mac OS X and chapter 6 with how to attack Windows systems. Chapter seven deals with remote kernel exploitation, chapter 8 is a Linux case study and chapter 9 looks to the future forms of attack and defense.
This last point is the key; it is impossible to create a defense unless you clearly understand the tactics used to attack. Therefore, this is a book that should be read by all people that program operating system kernels.
Read more ›
Comment | 
Was this review helpful to you?
Most Recent Customer Reviews
4.0 out of 5 stars Good Overview
The authors do a good job of laying out the details kernel exploitation. The only reason I am dropping a star is because they do not discuss mobile platforms at all and... Read more
Published 12 months ago by Mike
4.0 out of 5 stars Rolling in the deep
This book is for the one who wants to get very deep into operating systems. Not just Linux. Windows. Mac OS X. But not for mainframe systems, such as z/OS of IBM. Read more
Published 20 months ago by Erol Esen
5.0 out of 5 stars Excellent Book
I am just getting into the kernel land programming, hoping to find useful information in the book to enhance my understanding of the nature of some of attacks. Read more
Published 23 months ago by kuma
4.0 out of 5 stars plenty of detailed information
A challenge in a book such as this is how much to assume the reader knows. Is the reader familiar with the OS internals and APIs, does the reader know how compilers generate code... Read more
Published 23 months ago by T. Burket
4.0 out of 5 stars Excellent book
WARNING: Don't read this book if you would prefer to remain blissfully ignorant of just how vulnerable computer operating systems are to compromise. Read more
Published 23 months ago by D. Baer
5.0 out of 5 stars A clear book written about a very real threat to the security of...
A Guide to Kernel Exploitation: Attacking the Core guides the developer or hacker in how to protect or exploit weaknesses in the kernel of Linux, Mac OS X and Windows. Read more
Published 23 months ago by Patrick Regan
5.0 out of 5 stars Learned a lot from this book
I learned a lot from this book. I'm not a professional programmer, but I have worked in computer security and the broader IT industry. Read more
Published on April 9, 2012 by Kristi Gilleland
4.0 out of 5 stars A Guide To Kernel Exploitation by Perla & Oldani - A Great Deep Dive...
A Guide to Kernel Exploitation: Attacking the Core is a great technically focused treatment of the topic. It is not written for the absolute beginner. Read more
Published on March 14, 2012 by Mark
5.0 out of 5 stars Prepare to learn
As I've said in a previous review, I've long since been interested in computer security, but have only recently started studying it. Read more
Published on March 15, 2011 by ut158
4.0 out of 5 stars Really interesting if it is your cup of tea
Typically i only write a review after I finish a book, but I wanted to be sure to write this review in advance since this is not a fast book to read. This book is not for everyone. Read more
Published on February 13, 2011 by M. Hyman
Search Customer Reviews
Only search this product's reviews
ARRAY(0xa1c95570)


Forums

There are no discussions about this product yet.
Be the first to discuss this product with the community.
Start a new discussion
Topic:
First post:
Prompts for sign-in
 



Look for Similar Items by Category