With the number of security countermeasures against user-land exploitation greaterthan ever these days, kernel-level exploitation is becoming increasingly popularamong attackers and, generically, exploit writers. Playing with the heart of a com-puter’s operating system can be a dangerous game. This book covers the theoreticaltechniques and approaches needed to develop reliable and effective kernel-levelexploits and applies them to different operating systems—namely, UNIX deriva-tives, Mac OS X, and Windows.
Kernel exploits require both art and science to achieve. Every OS has itsquirks, so every exploit must be molded to take full advantage of its target. Thisbook discusses the most popular OS families—UNIX derivatives, Mac OS X, andWindows—and how to gain complete control over them.Concepts and tactics are presented categorically so that even when a specifi-cally detailed vulnerability has been patched, the foundational information thatyou have read will help you to write a newer, better attack if you are a hacker; ora more concrete design and defensive structure if you are a pen tester, auditor, orthe like.