Skip to Content
Advanced Infrastructure Penetration Testing
book

Advanced Infrastructure Penetration Testing

by Chiheb Chebbi
February 2018
Intermediate to advanced
396 pages
9h 38m
English
Packt Publishing
Content preview from Advanced Infrastructure Penetration Testing

UserLand versus kernel land

Most operating systems rely on a ring protection model. This model represents superposed conceptual rings varying from high to low privileges. There are four layers numbered from 0 to 3:

  • Ring 3: This layer is the usual interaction layer, with the user normally in the user mode.
  • Ring 2: This layer contains operations with low privilege.
  • Ring 1: This is the layer of input/output operations.
  • Ring 0: This is the most sensitive layer. The kernel resides in this layer.

Linux, like many recent operating systems, doesn't rely exactly on a ring protection mechanism, but it is working on a two-layer mode: user mode, and ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Practical Web Penetration Testing

Practical Web Penetration Testing

Gus Khawaja
Securing Network Infrastructure

Securing Network Infrastructure

Sairam Jetty, Sagar Rahalkar

Publisher Resources

ISBN: 9781788624480Supplemental Content