O'Reilly logo

A Guide to Kernel Exploitation by Massimiliano Oldani, Enrico Perla

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7 Facing the Challenges of Remote Kernel Exploitation

Information in this Chapter

  • Attacking Remote Vulnerabilities

  • Executing the First Instruction

  • Remote Payloads

Introduction

Remote kernel exploitation has slipped under the radar, at least publicly, for a much longer period of time than local kernel exploitation. The first public example of a remote kernel exploitation dates back to 2005, when Barnaby Jack, from eEye Digital Security, released a paper titled “Remote Windows Kernel Exploitation – Step into the Ring 0,”A which presents a detailed analysis of a working remote kernel exploit against the Symantec line of personal firewalls.B

Fast-forward a few years, and the landscape has changed significantly. Every major ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required