Product: 1597494860

WARNING: Don’t read this book if you would prefer to remain blissfully ignorant of just how vulnerable computer operating systems are to compromise.

This book is an intriguing read for anyone interested in how kernel exploits can be created and why they are such a problem. It took me a long time to get through this book due to its very technical nature – not that I mind, but it did feel more like a college homework assignment than a recreational read. I’m a computer science guy, so I probably had more motivation to get through it than most. You’ve been warned.

I like the fact that the author covered the UNIX family AND Windows and Mac OS X (arguably a member of the UNIX family, but with some unique characteristics). That way, the reader can choose which section(s) to read based on his/her familiarity with those operating systems. So many other books concentrate on one OS (normally Linux) when considering kernel exploits, and that makes the material feel less relevant to those who don’t typically use those OSes.

Instead of just being a technical HOW-TO guide containing instructions for the reader to blindly follow, this book explains why and how these types exploits can be crafted, including a full case study based in Linux. It covers a lot of theory and explains the differences between kernel mode and user mode in simple terms.

Even if you’re not interested in CREATING kernel exploits yourself, this book provides a solid foundation for understanding kernel functionality and surface area exposed for exploitation.
Rating: 4
1597494860
Count: 6