A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and approaches needed to develop reliable and effective kernel-level exp
"Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern opera
Escalate your privileges on Windows and Linux platforms with step-by-step instructions and deepen your theoretical foundations Key FeaturesDiscover a range of t
This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security hole
Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various appl