Chapter 7 Facing the Challenges of Remote Kernel Exploitation
Information in this Chapter
-
Attacking Remote Vulnerabilities
-
Executing the First Instruction
-
Remote Payloads
Introduction
Remote kernel exploitation has slipped under the radar, at least publicly, for a much longer period of time than local kernel exploitation. The first public example of a remote kernel exploitation dates back to 2005, when Barnaby Jack, from eEye Digital Security, released a paper titled “Remote Windows Kernel Exploitation – Step into the Ring 0,”A which presents a detailed analysis of a working remote kernel exploit against the Symantec line of personal firewalls.B
Fast-forward a few years, and the landscape has changed significantly. Every major ...
Get A Guide to Kernel Exploitation now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.