October 2010
Beginner to intermediate
464 pages
13h 19m
English
Information in this Chapter
Attacking Remote Vulnerabilities
Executing the First Instruction
Remote Payloads
Introduction
Remote kernel exploitation has slipped under the radar, at least publicly, for a much longer period of time than local kernel exploitation. The first public example of a remote kernel exploitation dates back to 2005, when Barnaby Jack, from eEye Digital Security, released a paper titled “Remote Windows Kernel Exploitation – Step into the Ring 0,”A which presents a detailed analysis of a working remote kernel exploit against the Symantec line of personal firewalls.B
Fast-forward a few years, and the landscape has changed significantly. Every major ...
Read now
Unlock full access