A Guide to Kernel Exploitation: Attacking the Core

A Guide to Kernel Exploitation: Attacking the Core

Have one to sell?
Sell yours Here >
See Details
Key Features
  • Publisher: Elsevier
  • Copyright: 2010
  • Language: English
  • ISBN13 : 9781597494861
  • Number Of Pages: 466 pages
  • Edition: NEW
  • Seller Score:
    3.7 / 5
    Selling on Jumia: 2 years
    Detailed Seller Ratings(Out of 5)
    • Fulfillment rate 2.0 (Below Average)
    • Product Quality 5.0 (Above Average)
    • Shipping Speed 4.0 (Above Average)
    1,000+Successful Sales
  • Delivery

    Delivery Timelines and Cities

    City

    Regular

    Cairo & Giza*

    3

    4 - 6

    Other cities

    4

    5 - 10

    *If order placed before 2pm.

    is available only for items with the Logo. Click here for more information

    Delivery times are business days only, and do not include Friday.

    Delivery timeline for international orders is 9-15 days. Click here for more info.

    Click here for our full Delivery Timelines

    & Click here for our Shipping fees details

    Delivery within: 6 business days
Pay cash on delivery
14 days free return

Free Return within 14-days. Details below.

No returns for Lingerie & Beachwear in Women clothes

Wrong Item - to be returned within 48 hours

All items are eligible for return

Changed Mind - to be returned within 7 days

Fashion, Mobile phones, Electronics, Computing

Damaged Item - to be returned within 14 days

Fashion, Mobile phones, Electronics, Computing, Books, Food, Bulky Items, International Products

Click here for more Returns Policy and Return Times.

Genuine product
A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits, and applies them to different operating systems, namely, UNIX derivatives, Mac OS X, and Windows. Concepts and tactics are presented categorically so that even when a specifically detailed vulnerability has been patched, the foundational information provided will help hackers in writing a newer, better attack; or help pen testers, auditors, and the like develop a more concrete design and defensive structure. The book is organized into four parts. Part I introduces the kernel and sets out the theoretical basis on which to build the rest of the book. Part II focuses on different operating systems and describes exploits for them that target various bug classes. Part III on remote kernel exploitation analyzes the effects of the remote scenario and presents new techniques to target remote issues. It includes a step-by-step analysis of the development of a reliable, one-shot, remote exploit for a real vulnerabilitya bug affecting the SCTP subsystem found in the Linux kernel. Finally, Part IV wraps up the analysis on kernel exploitation and looks at what the future may hold. * Covers a range of operating system families - UNIX derivatives, Mac OS X, Windows* Details common scenarios such as generic memory corruption (stack overflow, heap overflow, etc.) issues, logical bugs and race conditions* Delivers the reader from user-land exploitation to the world of kernel-land (OS) exploits/attacks, with a particular focus on the steps that lead to the creation of successful techniques, in order to give to the reader something more than just a set of tricks
Key Features
  • Publisher: Elsevier
  • Copyright: 2010
  • Language: English
  • ISBN13 : 9781597494861
  • Number Of Pages: 466 pages
  • Edition: NEW
  • Author: Dublin, Enrico Perla B.Sc. Computer Science University of Torino M.Sc. Computer Science Trinity
Specifications of A Guide to Kernel Exploitation: Attacking the Core
SKU
JU030BKAKF3DNAFAMZ
Model
BACCAH - 9781597494861
Main Material
Paperback
Author
Dublin, Enrico Perla B.Sc. Computer Science University of Torino M.Sc. Computer Science Trinity
  • 5 stars
    (0)
  • 4 stars
    (0)
  • 3 stars
    (0)
  • 2 stars
    (0)
  • 1 star
    (0)
Average Rating
0
No rating yet.
Have you used this product before?
Write a review'
Can I return this product?

You can return this product for a refund, within 14 days after receiving your original order.

You can return this product ONLY if you have received the wrong product or if the product has been damaged.



How to return this product?

You need to request a return by calling Customer Service 19586



What are the required conditions?

Please see below conditions for your return request to be accepted:

- product must remain sealed, except if the product is defective or damaged

- product is still in its original packaging

- product is in its original condition and unused

- product is not damaged

- product label is still attached


The products in your possession are your responsibility until they are picked up by our driver or you have dropped it off at a pickup Station. Any product that is not properly packed or is damaged will not be eligible for a return, so make sure they are properly taken care of prior to the return!



What are the next steps?

Once your return request done, we will contact you to arrange retrieval of the product. You will also have the choice to deliver yourself the product to one of our pickup Stations.


Once the product retrieved, we will proceed to examination.

- In the unlikely event that an item is returned to us in an unsuitable condition, we will send it back to you without refund.

- If examination conclusive and conditions respected, we will proceed to refund within maximum 14 business days post retrieval product.