A guide to kernel exploitation: attacking the core
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Amsterdam [u.a.]
Elsevier/Syngress
2011
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | xxi, 442 p. Ill., graph. Darst. 24 cm |
ISBN: | 9781597494861 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV040459980 | ||
003 | DE-604 | ||
005 | 20171106 | ||
007 | t | ||
008 | 121008s2011 ne ad|| |||| 00||| eng d | ||
010 | |a 2010027939 | ||
020 | |a 9781597494861 |c pbk. : alk. paper |9 978-1-59749-486-1 | ||
035 | |a (OCoLC)815945521 | ||
035 | |a (DE-599)BVBBV040459980 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a ne |c NL | ||
049 | |a DE-91G |a DE-Aug4 |a DE-473 | ||
050 | 0 | |a QA76.76.O63 | |
082 | 0 | |a 005.8 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a DAT 055f |2 stub | ||
084 | |a DAT 460f |2 stub | ||
100 | 1 | |a Perla, Enrico |e Verfasser |0 (DE-588)143048821 |4 aut | |
245 | 1 | 0 | |a A guide to kernel exploitation |b attacking the core |c Enrico Perla ; Massimiliano Oldani ; technical editor, Graham Speake |
264 | 1 | |a Amsterdam [u.a.] |b Elsevier/Syngress |c 2011 | |
300 | |a xxi, 442 p. |b Ill., graph. Darst. |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a Operating systems (Computers) |x Security measures | |
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a Hacker |0 (DE-588)4113821-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Exploit |0 (DE-588)4752509-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kernel |g Informatik |0 (DE-588)4338679-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Angriff |0 (DE-588)4142472-4 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Kernel |g Informatik |0 (DE-588)4338679-9 |D s |
689 | 0 | 1 | |a Angriff |0 (DE-588)4142472-4 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | 1 | |a Kernel |g Informatik |0 (DE-588)4338679-9 |D s |
689 | 1 | 2 | |a Exploit |0 (DE-588)4752509-5 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
689 | 2 | 0 | |a Kernel |g Informatik |0 (DE-588)4338679-9 |D s |
689 | 2 | 1 | |a Hacker |0 (DE-588)4113821-1 |D s |
689 | 2 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 2 | |8 2\p |5 DE-604 | |
700 | 1 | |a Oldani, Massimiliano |e Verfasser |0 (DE-588)185668488 |4 aut | |
856 | 4 | 2 | |m Digitalisierung UB Bamberg - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025307442&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-025307442 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804149524635058176 |
---|---|
adam_text | Contents
Foreword...............................................................xi
Preface..............................................................xiii
Acknowledgments......................................................xvii
About the Authors.....................................................xix
About the Technical Editor............................................xxi
PART I A JOURNEY TO KERNEL LAND______________________________________________
CHAPTER 1 From User-Land to Kernel-land Attacks.............................3
Introduction.................................................3
Introducing the Kernel and the World of Kernel Exploitation. .. 3
The Art of Exploitation................................5
Why Doesn’t My User-Land Exploit Work Anymore?...............9
Kernel-Land Exploits versus User-Land Exploits........11
An Exploit Writer’s View of the Kernel......................13
User-Land Processes and the Scheduler.................13
Virtual Memory........................................14
Open Source versus Closed Source Operating Systems..........18
Summary.....................................................18
Related Reading.............................................19
Endnote.....................................................19
CHAPTER 2 A Taxonomy of Kernel Vulnerabilities.............................21
Introduction................................................21
Uninitialized/Nonvalidated/Corrupted Pointer Dereference...22
Memory Corruption Vulnerabilities...........................26
Kernel Stack Vulnerabilities..........................26
Kernel Heap Vulnerabilities...........................27
Integer Issues..............................................29
(Arithmetic) Integer Overflows........................29
Sign Conversion Issues................................31
Race Conditions.............................................33
Logic Bugs (a.k.a. the Bug Grab Bag)........................39
Reference Counter Overflow............................39
Physical Device Input Validation......................40
Kernel-Generated User-Land Vulnerabilities............41
Summary................................................... 44
Endnotes....................................................44
Contents
CHAPTER 3 Stairway to Successful Kernel Exploitation..............47
Introduction............................................47
A Look at the Architecture Level........................48
Generic Concepts...................................48
x86 and x86-64.....................................55
The Execution Step......................................58
Placing the Shellcode..............................59
Forging the Shellcode..............................66
The Triggering Step....................................71
Memory Corruption..................................71
Race Conditions................................... 86
The Information-Gathering Step..........................90
What the Environment Tells Us......................91
What the Environment Would Not
Want to Tell Us: Infoleaks.........................96
Summary.................................................98
Related Reading.........................................99
PART II THE UNIX FAMILY, MAC OS X, AND WINDOWS
CHAPTER 4 The UNIX Family........................................103
Introduction......................................... 103
The Members of the UNIX Family.........................104
Linux.............................................104
Solaris/OpenSolaris...............................114
BSD Derivatives...................................125
The Execution Step.................................... 126
Abusing the Linux Privilege Model.................126
Practical UNIX Exploitation............................138
Kernel Heap Exploitation..........................138
Attacking the OpenSolaris Slab Allocator..........139
Attacking the Linux 2.6 SLABAHAHUB Allocator......160
Attacking (Linux) Kernel Stack Overflows..........177
Revisiting CVE-2009-3234......................... 184
Summary................................................193
Endnotes...............................................194
CHAPTERS Mac OS X...............................................195
Introduction...........................................195
An Overview of XNU.....................................196
Mach..............................................197
BSD...............................................197
Contents
IOKit............................................ 197
System Call Tables.................................198
Kernel Debugging........................................200
Kernel Extensions (Kext)................................208
IOKit............................................. 214
Kernel Extension Auditing....................... 215
The Execution Step......................................227
Exploitation Notes..................................... 228
Arbitrary Memory Overwrite.........................229
Stack-Based Buffer Overflows.......................239
Memory Allocator Exploitation......................253
Race Conditions....................................266
Snow Leopard Exploitation..........................266
Summary.................................................266
Endnotes................................................267
CHAPTER 6 Windows.................................................... 269
Introduction............................................269
Windows Kernel Overview.................................271
Kernel Information Gathering.......................272
Introducing DVWD: Damn Vulnerable Windows
Driver.............................................276
Kernel Internals Walkthrough.......................278
Kernel Debugging...................................282
The Execution Step......................................285
Windows Authorization Model........................286
Building the Shellcode.............................295
Practical Windows Exploitation..........................308
Arbitrary Memory Overwrite.........................308
Stack Buffer Overflow..............................319
Summary.................................................339
Endnotes................................................340
PART III REMOTE KERNEL EXPLOITATION_______________________________________
CHAPTER 7 Facing the Challenges of Remote
Kernel Exploitation.....................................343
Introduction............................................343
Attacking Remote Vulnerabilities........................344
Lack of Exposed Information........................344
Lack of Control over the Remote Target.............347
Contents
Executing the First Instruction...........................348
Direct Execution Flow Redirection.....................349
Arbitrary Write of Kernel Memory......................360
Remote Payloads...........................................362
Payload Migration.....................................364
Summary...................................................383
Endnote...................................................384
CHAPTER 8 Putting It All Together: A Linux Case Study..................385
Introduction..............................................385
SCTP FWD Chunk Heap Memory Corruption.....................386
A Brief Overview of SCTP..............................386
The Vulnerable Path...................................389
Remote Exploitation: An Overall Analysis..................393
Getting the Arbitrary Memory Overwrite Primitive..........394
Remotely Adjusting the Heap Layout....................395
Building SCTP Messages: From Relative
to Absolute Memory Overwrite..........................397
Installing the Shellcode..................................403
Directly Jumping from Interrupt Context to User
Mode..................................................403
Executing the Shellcode...................................410
Checking the Current Process and Emulating
the gettimeofdayO function............................411
Executing the Connect-Back............................412
Recovering the Vsyscall............................. 413
Summary.................................................. 414
Related Reading......................................... 415
Endnote...................................................415
PART IV FINAL WORDS__________________________________________________________
CHAPTER 9 Kernel Evolution: Future Forms of Attack
and Defense...............................................419
Introduction..............................................419
Kernel Attacks............................................420
Confidentiality.......................................420
Integrity............................................ 422
Availability..........................................425
Kernel Defense........................................... 425
Kernel Threat Analysis and Modeling...................425
Contents ix
Kernel Defense Mechanisms............................427
Kernel Assurance.....................................428
Beyond Kernel Bugs: Virtualization........................432
Hypervisor Security..................................432
Guest Kernel Security................................433
Summary...................................................434
Index...................................................................437
|
any_adam_object | 1 |
author | Perla, Enrico Oldani, Massimiliano |
author_GND | (DE-588)143048821 (DE-588)185668488 |
author_facet | Perla, Enrico Oldani, Massimiliano |
author_role | aut aut |
author_sort | Perla, Enrico |
author_variant | e p ep m o mo |
building | Verbundindex |
bvnumber | BV040459980 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.76.O63 |
callnumber-search | QA76.76.O63 |
callnumber-sort | QA 276.76 O63 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 277 |
classification_tum | DAT 055f DAT 460f |
ctrlnum | (OCoLC)815945521 (DE-599)BVBBV040459980 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02568nam a2200613zc 4500</leader><controlfield tag="001">BV040459980</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20171106 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">121008s2011 ne ad|| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2010027939</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597494861</subfield><subfield code="c">pbk. : alk. paper</subfield><subfield code="9">978-1-59749-486-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)815945521</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV040459980</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">ne</subfield><subfield code="c">NL</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-473</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.76.O63</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 055f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Perla, Enrico</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)143048821</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">A guide to kernel exploitation</subfield><subfield code="b">attacking the core</subfield><subfield code="c">Enrico Perla ; Massimiliano Oldani ; technical editor, Graham Speake</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam [u.a.]</subfield><subfield code="b">Elsevier/Syngress</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxi, 442 p.</subfield><subfield code="b">Ill., graph. Darst.</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operating systems (Computers)</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Exploit</subfield><subfield code="0">(DE-588)4752509-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kernel</subfield><subfield code="g">Informatik</subfield><subfield code="0">(DE-588)4338679-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Angriff</subfield><subfield code="0">(DE-588)4142472-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kernel</subfield><subfield code="g">Informatik</subfield><subfield code="0">(DE-588)4338679-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Angriff</subfield><subfield code="0">(DE-588)4142472-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Kernel</subfield><subfield code="g">Informatik</subfield><subfield code="0">(DE-588)4338679-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Exploit</subfield><subfield code="0">(DE-588)4752509-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Kernel</subfield><subfield code="g">Informatik</subfield><subfield code="0">(DE-588)4338679-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Oldani, Massimiliano</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)185668488</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bamberg - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025307442&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025307442</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV040459980 |
illustrated | Illustrated |
indexdate | 2024-07-10T00:24:24Z |
institution | BVB |
isbn | 9781597494861 |
language | English |
lccn | 2010027939 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025307442 |
oclc_num | 815945521 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM DE-Aug4 DE-473 DE-BY-UBG |
owner_facet | DE-91G DE-BY-TUM DE-Aug4 DE-473 DE-BY-UBG |
physical | xxi, 442 p. Ill., graph. Darst. 24 cm |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Elsevier/Syngress |
record_format | marc |
spelling | Perla, Enrico Verfasser (DE-588)143048821 aut A guide to kernel exploitation attacking the core Enrico Perla ; Massimiliano Oldani ; technical editor, Graham Speake Amsterdam [u.a.] Elsevier/Syngress 2011 xxi, 442 p. Ill., graph. Darst. 24 cm txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index Operating systems (Computers) Security measures Computer security Hacker (DE-588)4113821-1 gnd rswk-swf Exploit (DE-588)4752509-5 gnd rswk-swf Kernel Informatik (DE-588)4338679-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Angriff (DE-588)4142472-4 gnd rswk-swf Kernel Informatik (DE-588)4338679-9 s Angriff (DE-588)4142472-4 s DE-604 Computersicherheit (DE-588)4274324-2 s Exploit (DE-588)4752509-5 s 1\p DE-604 Hacker (DE-588)4113821-1 s 2\p DE-604 Oldani, Massimiliano Verfasser (DE-588)185668488 aut Digitalisierung UB Bamberg - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025307442&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Perla, Enrico Oldani, Massimiliano A guide to kernel exploitation attacking the core Operating systems (Computers) Security measures Computer security Hacker (DE-588)4113821-1 gnd Exploit (DE-588)4752509-5 gnd Kernel Informatik (DE-588)4338679-9 gnd Computersicherheit (DE-588)4274324-2 gnd Angriff (DE-588)4142472-4 gnd |
subject_GND | (DE-588)4113821-1 (DE-588)4752509-5 (DE-588)4338679-9 (DE-588)4274324-2 (DE-588)4142472-4 |
title | A guide to kernel exploitation attacking the core |
title_auth | A guide to kernel exploitation attacking the core |
title_exact_search | A guide to kernel exploitation attacking the core |
title_full | A guide to kernel exploitation attacking the core Enrico Perla ; Massimiliano Oldani ; technical editor, Graham Speake |
title_fullStr | A guide to kernel exploitation attacking the core Enrico Perla ; Massimiliano Oldani ; technical editor, Graham Speake |
title_full_unstemmed | A guide to kernel exploitation attacking the core Enrico Perla ; Massimiliano Oldani ; technical editor, Graham Speake |
title_short | A guide to kernel exploitation |
title_sort | a guide to kernel exploitation attacking the core |
title_sub | attacking the core |
topic | Operating systems (Computers) Security measures Computer security Hacker (DE-588)4113821-1 gnd Exploit (DE-588)4752509-5 gnd Kernel Informatik (DE-588)4338679-9 gnd Computersicherheit (DE-588)4274324-2 gnd Angriff (DE-588)4142472-4 gnd |
topic_facet | Operating systems (Computers) Security measures Computer security Hacker Exploit Kernel Informatik Computersicherheit Angriff |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025307442&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT perlaenrico aguidetokernelexploitationattackingthecore AT oldanimassimiliano aguidetokernelexploitationattackingthecore |