Index
Note: Page numbers in italics indicate figures and tables.
A
-
Access Control Entries (ACEs), 286
-
Access control list (ACL), 286, 290
-
Access token, 286, 292–295
-
locating, 299
-
patching, 299–300
-
-
Alloc algorithm, 144
-
AMD64, 57
-
APCs. See Asynchronous procedure calls
-
Application Binary Interface (ABI), 53
-
Arbitrary memory overwrite, 71–74, 229–239, 277
-
exploiting architecture, 73–74
-
global structures' function pointers, 72
-
-
Architecture level, kernel, 48, 48–58
-
Architecture-assisted software tables, 94–95, 95
-
Asynchronous interrupts, 365
-
Asynchronous procedure calls (APCs), exploiting Windows, 381–383
B
-
Brute forcing, 7
-
BSD
-
derivatives, 125
-
of XNU kernel, 197
-
-
Buffer overflow, 24, 28 ...
Get A Guide to Kernel Exploitation now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.