

A Guide to Kernel Exploitation: Attacking the Core [Perla B.Sc. Computer Science University of Torino M.Sc. Computer Science Trinity College Dublin, Enrico, Oldani, Massimiliano] on desertcart.com. *FREE* shipping on qualifying offers. A Guide to Kernel Exploitation: Attacking the Core Review: An excellent book on kernel exploitation - I bought this book in hopes of finding an informative and thought provoking look at kernel exploitation - I was not disappointed. Aside from a few minor typos, I found this book to be one of the most well written books on exploitation that I have read. I have recommended it to some fellow students and a professor (I am a graduate student in computer science). I highly recommend this book for anybody that is interested in kernel exploitation. In my opinion, this book is currently the best source of information on exploiting the kernel since Phrack #64 file 6. Review: This book is the best book I've ever read - This book is the best book I've ever read. No, but seriously, its like the keys to the kingdom. The authors do a great job of giving you a foundation in the starting chapters (however, it is very helpful if you have a coding background and have some knowledge of how and kernel/processor works, generally). I'm about half way through the book and I have learned so much about exploitation - this book is priceless.
B**E
An excellent book on kernel exploitation
I bought this book in hopes of finding an informative and thought provoking look at kernel exploitation - I was not disappointed. Aside from a few minor typos, I found this book to be one of the most well written books on exploitation that I have read. I have recommended it to some fellow students and a professor (I am a graduate student in computer science). I highly recommend this book for anybody that is interested in kernel exploitation. In my opinion, this book is currently the best source of information on exploiting the kernel since Phrack #64 file 6.
D**O
This book is the best book I've ever read
This book is the best book I've ever read. No, but seriously, its like the keys to the kingdom. The authors do a great job of giving you a foundation in the starting chapters (however, it is very helpful if you have a coding background and have some knowledge of how and kernel/processor works, generally). I'm about half way through the book and I have learned so much about exploitation - this book is priceless.
R**R
Dated But Useful
Ignoring the obvious issue with this being extremely dated back to Windows Vista the content is still somewhat valuable. I do wish there was a 2nd edition, but having bought and read this in 2024 it was still a useful experience. Just not as useful as I would have liked.
Q**I
I really love it. But the website hosting source code of ...
This book gives very clear guidance to show how to develop exploitation attacking OS kernel. I really love it. But the website hosting source code of this book is down. I don't know where to down load the source code. If there is another source to download the source code that would be awesome.
Z**3
Five Stars
Gift that was appreciated and still being reviewed.
D**V
Readable, instructive, concise, just two caveats
My colleague showed me this book (full disclosure: he was a reviewer) - he made his students buy it it for his OS II class (assigned middle of the semester!) one week ago - hot off the presses. I got two copies, one for my office and one for reading on the bus. It's one of three technical exploit books I'd take on a deserted, networked, powered island. Part 1: Journey into Kernel Land (Intro and explanations) is one of the most succinct clear intros I have ever seen. I wish I could distributed that as a document for class. The section on Windows is current and well done, also because the difference between 32 and 64 bit architectures and approaches are emphasized (this is not the case with Eilam's book alas, though very good) - this book is up to date. I think the Unix section needs to be updated, though, my colleague said that some of the exploits were possible in 2006/2007 but with kernel changes some APIs are not available etc. This needs to be updated. Cannot comment on the Mac section, because no expertise. Website available and examples useful: [...] Wishlist: 1) There are some unavoidable typos, sure: p.10: MAC is nor Media Access Control in a security context, it's Mandatory Access Control 2) I would have really really like an expanded section on hypervisors and virtualization (there is a mini epilogue on it at the end)- that would have made my day 3) The Linux case study was neat - for next version, do Windows Stuxnet's m.o. because it adds all sorts of interesting kernel root attack pathways You will not regret buying this book - it is obvious and much appreciated that the authors put a lot of effort into making an readable guide for the medium to expert reader that can double as a textbook companion. Daniel Bilar CS Department UNO
T**T
Easy reading
This was the first kernel related book I've read and it was very approachable an easy to understand. Each section breaks the necessary information down into understandable pieces. The background info provided is very useful for someone with no kernel background. However the amount of general kernel information was 50% of the book. For people who have some kernel background this book would most likely bore them to death.
J**O
so so
is nice but is like just with C and leave a side more languages
B**S
Das Buch ist zwar schon etwas älter, aber um die Grundlagen zu lernen sehr gut. Es ist sehr ausführlich und sehr gut geschrieben. Leider ist das Englisch teilweise schwer zu verstehen (ich bin nicht der beste) weswegen man Sachen manchmal öfter lesen muss. Aber dafür gibt es ja die deutsche Version. Alles in allem ein sehr gutes umfangreiches Buch um in das Thema einzusteigen.
E**K
Coming from a background in IT security and with a reasonable understanding of system architectures I found this book to be an absolutely refreshing change from the standard regurgitated offerings that are dominating the field due to nothing better being available. This book gives you a solid understanding of a wide range of kernel (and application) level security flaws to a level where you would feel comfortable discussing this not with your average IT security consultant (who would be lost soon after stack overflow) but with serious and dedicated professionals working at the bleeding edge of OS security. I cannot recommend this book highly enough. However it does assume a background of being able to follow C code (or at least understand the algorithmic flow), elementary Data structures (pointers, lists) and fundamentals of OS design (try Operating Systems by Deitel for a good core intro). Some assembly might help as well. But don't let that put you off... it's not absolutely necessary. It genuinely is one of those books where you think 'WOW.. I wish I wrote that!'. Nothing in the field comes closer to delivering what this book does. As you may have guessed. Highly recommended.
R**L
El libro estaba en buenas condiciones y llegó cuando se esperaba, lo compré para regalar y a mí chico le encantó. Sobre el contenido no puedo valorar, pero él que es el experto dice que es bueno😄
Trustpilot
3 weeks ago
1 month ago