Introduction

  1. , Facing the Challenges of Remote Kernel Exploitation 343

  2. , Putting It All Together: A Linux Case Study 385

The next step after playing with local vulnerabilities is to challenge ourselves and attack the vulnerabilities remotely. Although remote kernel vulnerabilities are not a new class (the classification we worked out in, Chapter 2 still holds here), the remote scenario sensibly affects our exploitation approaches and techniques. Staying in sync with the rest of the book, we start here by identifying the challenges that the remote scenario presents and the various techniques to overcome them, and then we move to apply the latter to a practical case: a Linux remote heap overflow in the SCTP handling code.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset