Index

Note: Page numbers in italics indicate figures and tables.

A

  • Access Control Entries (ACEs), 286

  • Access control list (ACL), 286, 290

  • Access token, 286, 292–295

    • locating, 299

    • patching, 299–300

  • Alloc algorithm, 144

  • AMD64, 57

  • APCs. See Asynchronous procedure calls

  • Application Binary Interface (ABI), 53

  • Arbitrary memory overwrite, 71–74, 229–239, 277

    • exploiting architecture, 73–74

    • global structures' function pointers, 72

  • Architecture level, kernel, 48, 48–58

  • Architecture-assisted software tables, 94–95, 95

  • Asynchronous interrupts, 365

  • Asynchronous procedure calls (APCs), exploiting Windows, 381–383

B

  • Brute forcing, 7

  • BSD

    • derivatives, 125

    • of XNU kernel, 197

  • Buffer overflow, 24, 28 ...

Get A Guide to Kernel Exploitation now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.