Chapter 7 Facing the Challenges of Remote Kernel Exploitation

Information in this Chapter

  • Attacking Remote Vulnerabilities

  • Executing the First Instruction

  • Remote Payloads

Introduction

Remote kernel exploitation has slipped under the radar, at least publicly, for a much longer period of time than local kernel exploitation. The first public example of a remote kernel exploitation dates back to 2005, when Barnaby Jack, from eEye Digital Security, released a paper titled “Remote Windows Kernel Exploitation – Step into the Ring 0,”A which presents a detailed analysis of a working remote kernel exploit against the Symantec line of personal firewalls.B

Fast-forward a few years, and the landscape has changed significantly. Every major ...

Get A Guide to Kernel Exploitation now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.