Nuevo:
-21% US$41.69US$41.69
Entrega el sábado, 19 de octubre
Enviado por: Amazon.com Vendido por: Amazon.com
Ahorra con Usado - Bueno
US$20.25US$20.25
Entrega por US$16.95 entre el 4 - 26 de noviembre
Enviado por: momox Shop Vendido por: momox Shop
Descarga la app de Kindle gratis y comienza a leer libros Kindle al instante desde tu smartphone, tablet o computadora, sin necesidad de ningún dispositivo Kindle.
Lee al instante desde tu navegador con Kindle para la web.
Usando la cámara de tu celular escanea el siguiente código y descarga la aplicación Kindle.
Imagen no disponible
Color:
-
-
-
- Para ver la descarga de este video Flash Player
Seguir al autor
Aceptar
A Guide to Kernel Exploitation: Attacking the Core 1st Edición
Opciones de compra y productos Add-on
The book is organized into four parts. Part I introduces the kernel and sets out the theoretical basis on which to build the rest of the book. Part II focuses on different operating systems and describes exploits for them that target various bug classes. Part III on remote kernel exploitation analyzes the effects of the remote scenario and presents new techniques to target remote issues. It includes a step-by-step analysis of the development of a reliable, one-shot, remote exploit for a real vulnerabilitya bug affecting the SCTP subsystem found in the Linux kernel. Finally, Part IV wraps up the analysis on kernel exploitation and looks at what the future may hold.
- Covers a range of operating system families ― UNIX derivatives, Mac OS X, Windows
- Details common scenarios such as generic memory corruption (stack overflow, heap overflow, etc.) issues, logical bugs and race conditions
- Delivers the reader from user-land exploitation to the world of kernel-land (OS) exploits/attacks, with a particular focus on the steps that lead to the creation of successful techniques, in order to give to the reader something more than just a set of tricks
- ISBN-101597494860
- ISBN-13978-1597494861
- Edición1er
- EditorialSyngress
- Fecha de publicación29 Septiembre 2010
- IdiomaInglés
- Dimensiones7.4 x 1.1 x 9.1 pulgadas
- Número de páginas464 páginas
Comprados juntos habitualmente

Los clientes que compraron este producto también compraron
Opiniones editoriales
Críticas
"A very interesting book that not only exposes readers to kernel exploitation techniques, but also deeply motivates the study of operating systems internals, moving such study far beyond simple curiosity."--Golden G. Richard III, Ph.D., Professor of Computer Science, University of New Orleans and CTO, Digital Forensics Solutions, LLC
Críticas
Contraportada
Biografía del autor
Massimiliano Oldani currently works as a Security Consultant at Emaze Networks. His main research topics include operating system security and kernel vulnerabilities.
Detalles del producto
- Editorial : Syngress; 1er edición (29 Septiembre 2010)
- Idioma : Inglés
- Tapa blanda : 464 páginas
- ISBN-10 : 1597494860
- ISBN-13 : 978-1597494861
- Dimensiones : 7.4 x 1.1 x 9.1 pulgadas
- Clasificación en los más vendidos de Amazon: nº579,472 en Libros (Ver el Top 100 en Libros)
- nº99 en Macos Sistemas Operativos
- nº302 en MIS (Libros)
- nº409 en Piratería Informática
- Opiniones de clientes:
Sobre el autor

Descubre más libros del autor, ve autores similares, lee recomendaciones de libros y más.
Opiniones de clientes
- 5 estrellas4 estrellas3 estrellas2 estrellas1 estrella5 estrellas65%21%5%8%2%65%
- 5 estrellas4 estrellas3 estrellas2 estrellas1 estrella4 estrellas65%21%5%8%2%21%
- 5 estrellas4 estrellas3 estrellas2 estrellas1 estrella3 estrellas65%21%5%8%2%5%
- 5 estrellas4 estrellas3 estrellas2 estrellas1 estrella2 estrellas65%21%5%8%2%8%
- 5 estrellas4 estrellas3 estrellas2 estrellas1 estrella1 estrella65%21%5%8%2%2%
Las opiniones de clientes, incluidas las valoraciones de productos ayudan a que los clientes conozcan más acerca del producto y decidan si es el producto adecuado para ellos.
Para calcular la valoración global y el desglose porcentual por estrella, no utilizamos un promedio simple. En cambio, nuestro sistema considera cosas como la actualidad de la opinión y si el revisor compró el producto en Amazon. También analiza las opiniones para verificar la confiabilidad.
Más información sobre cómo funcionan las opiniones de clientes en Amazon-
Opiniones principales
Opiniones destacadas de los Estados Unidos
Ha surgido un problema al filtrar las opiniones justo en este momento. Vuelva a intentarlo en otro momento.
Each section breaks the necessary information down into understandable pieces. The background info provided is very useful for someone with no kernel background. However the amount of general kernel information was 50% of the book. For people who have some kernel background this book would most likely bore them to death.
It's one of three technical exploit books I'd take on a deserted, networked, powered island. Part 1: Journey into Kernel Land (Intro and explanations) is one of the most succinct clear intros I have ever seen. I wish I could distributed that as a document for class. The section on Windows is current and well done, also because the difference between 32 and 64 bit architectures and approaches are emphasized (this is not the case with Eilam's book alas, though very good) - this book is up to date. I think the Unix section needs to be updated, though, my colleague said that some of the exploits were possible in 2006/2007 but with kernel changes some APIs are not available etc. This needs to be updated. Cannot comment on the Mac section, because no expertise.
Website available and examples useful: [...]
Wishlist:
1) There are some unavoidable typos, sure: p.10: MAC is nor Media Access Control in a security context, it's Mandatory Access Control
2) I would have really really like an expanded section on hypervisors and virtualization (there is a mini epilogue on it at the end)- that would have made my day
3) The Linux case study was neat - for next version, do Windows Stuxnet's m.o. because it adds all sorts of interesting kernel root attack pathways
You will not regret buying this book - it is obvious and much appreciated that the authors put a lot of effort into making an readable guide for the medium to expert reader that can double as a textbook companion.
Daniel Bilar
CS Department
UNO
Opiniones más destacadas de otros países
This book gives you a solid understanding of a wide range of kernel (and application) level security flaws to a level where you would feel comfortable discussing this not with your average IT security consultant (who would be lost soon after stack overflow) but with serious and dedicated professionals working at the bleeding edge of OS security.
I cannot recommend this book highly enough. However it does assume a background of being able to follow C code (or at least understand the algorithmic flow), elementary Data structures (pointers, lists) and fundamentals of OS design (try Operating Systems by Deitel for a good core intro). Some assembly might help as well. But don't let that put you off... it's not absolutely necessary.
It genuinely is one of those books where you think 'WOW.. I wish I wrote that!'.
Nothing in the field comes closer to delivering what this book does.
As you may have guessed. Highly recommended.







