Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Enrico Perla"'
Autor:
Enrico Perla, Massimiliano Oldani
Jede Anwendung benötigt zum Ablauf ein Betriebssystem. Wenn ein Angreifer Vollzugriff auf das Betriebssystem hat, gelangt er auch an die Anwendungsdaten. Diesen Zugriff verschaffen sich Hacker über Schwachstellen im Kernel. Die Entwicklung von Kern
Autor:
Enrico Perla, Massimiliano Oldani
A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits, and applies them to different operating systems, namely, UNIX derivatives, Mac OS X
Autor:
Massimiliano Oldani, Enrico Perla
Publisher Summary This chapter focuses on local Windows kernel exploitation. The chapter begins by introducing Windows kernel fundamentals and how to prepare a working environment. The chapter shows how to elevate the privileges of an arbitrary proce
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::39f6fb268f2ac9a09529f593d2113450
https://doi.org/10.1016/b978-1-59749-486-1.00006-1
https://doi.org/10.1016/b978-1-59749-486-1.00006-1
Autor:
Massimiliano Oldani, Enrico Perla
Publisher Summary This chapter discusses the major building blocks of a kernel exploit. It begins by focusing on the architecture level: the physical layer on top of which operating systems (and exploits targeting them) run. Following the theoretical
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::718213deaa212f01c40a9177a146f0bd
https://doi.org/10.1016/b978-1-59749-486-1.00003-6
https://doi.org/10.1016/b978-1-59749-486-1.00003-6
Autor:
Massimiliano Oldani, Enrico Perla
This chapter focuses on remote kernel exploitation, introducing the main ideas behind writing remote kernel exploits. Remote vulnerabilities are traditional ones that are reachable through the network without having access to the target machine. The
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8f933f4bf8820b5f5b24e840bf922fe8
https://doi.org/10.1016/b978-1-59749-486-1.00007-3
https://doi.org/10.1016/b978-1-59749-486-1.00007-3
Autor:
Massimiliano Oldani, Enrico Perla
This chapter discusses various different vulnerability classes that may affect an operating system. It starts with vulnerabilities related to the dereferencing of an uninitialized, trashed, or improperly sanitized pointer. Memory corruption vulnerabi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c54ab79a43c3bdffb3753f8b4921894f
https://doi.org/10.1016/b978-1-59749-486-1.00002-4
https://doi.org/10.1016/b978-1-59749-486-1.00002-4
Autor:
Enrico Perla, Massimiliano Oldani
This chapter covers the UNIX family, focusing on two of its members: Linux (mostly) and (Open)Solaris. It begins by the execution step, where the discussion focuses on the development of a privilege-raising shellcode for the Linux operating system. T
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8b87ee3a02e5e72fec79a268142dd14f
https://doi.org/10.1016/b978-1-59749-486-1.00004-8
https://doi.org/10.1016/b978-1-59749-486-1.00004-8
Autor:
Massimiliano Oldani, Enrico Perla
Publisher Summary In the past, kernel exploits have proven to be not only possible, but also extremely powerful and efficient, especially on systems equipped with state-of-the-art security patches. This power comes with the expense of requiring a wid
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c726ad4e64e271215e2d6d553958cab0
https://doi.org/10.1016/b978-1-59749-486-1.00001-2
https://doi.org/10.1016/b978-1-59749-486-1.00001-2
Autor:
Enrico Perla, Massimiliano Oldani
This chapter discusses how writing a real-world remote kernel exploit involves overcoming multiple challenges and hurdles, including everything from analyzing the kernel's vulnerable protocol implementation to remotely controlling the kernel memory m
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::dd3bb9b52f64c9745fe8b739ac9ef848
https://doi.org/10.1016/b978-1-59749-486-1.00008-5
https://doi.org/10.1016/b978-1-59749-486-1.00008-5