Exploitation: 6,429 results found.
|
:: A Guide to Kernel Exploitation :: Attacking the Core
With the increasing number of security countermeasures against user land exploitation, kernel level exploitation is getting more and more popular among attackers and, generically, exploit writers. Playing with the heart of the operating system can be a dangerous game: this book covers the theoretical techniques and approaches needed to develop reliable and effective kernel level exploits and applies them to different operating systems (Unix-derivate, Mac OS X, Windows).
Attackingthecore.com ~
Site Info
Whois
Trace Route
RBL Check
|
|
|
|