Chapter 7 Facing the Challenges of Remote Kernel Exploitation
Information in this Chapter
Attacking Remote Vulnerabilities
Executing the First Instruction
Remote kernel exploitation has slipped under the radar, at least publicly, for a much longer period of time than local kernel exploitation. The first public example of a remote kernel exploitation dates back to 2005, when Barnaby Jack, from eEye Digital Security, released a paper titled “Remote Windows Kernel Exploitation – Step into the Ring 0,”A which presents a detailed analysis of a working remote kernel exploit against the Symantec line of personal firewalls.B
Fast-forward a few years, and the landscape has changed significantly. Every major ...