Главная
Study mode:
on
1
Intro
2
What I'm Going to Talk About
3
Sandboxing Requirement #1
4
Typical User-Mode Approach
5
Object Security Descriptor
6
Resource Access Check
7
Owner Check
8
Kernel DACL Check
9
Kernel Access Check
10
Restricted Access Tokens
11
Restricted Token Access Check
12
Crash!
13
Process Initialization
14
Device Drivers
15
Opening a Device Name
16
Securing the Device
17
Example: Windows Sockets
18
Native Sockets
19
Accessing Resources
20
Direct Resource Access
21
Sharing Resource Access
22
Bad Registry
23
IE EPM Escape / Audio Server
24
Lack of Documentation
25
Broker Resource Access
26
Win32 Path Support
27
Legacy Filesystem Behaviour
28
Canonicalization
29
Device Escape Syntax
30
Invalid Character Checks
31
Hybrid Resource Access
32
Reparse Points
33
Mixed Semantics
34
Sharing Sections
35
Unnamed Resources
36
IPC Technologies
37
Named Pipes
38
Chrome CreateNamed Pipe IPC
39
Reducing Kernel Attack Surface
40
The Good Parts
41
LowBox Token Access Check
42
Integrity Level Check
43
Mandatory Integrity Level Checi
Description:
Explore the challenges and vulnerabilities of Windows sandboxing in this 45-minute conference talk from nullcon Goa 2015. Delve into the complexities of securing user applications against Remote Code Execution (RCE) vulnerabilities, examining the limitations of Windows operating system in providing robust sandboxing solutions. Discover how missing features, poor documentation, and unexpected behaviors make creating secure sandboxes on Windows a daunting task. Analyze specific issues with built-in technologies like Windows 8 AppContainer and learn about interesting bugs in sandboxed applications such as Chrome, Internet Explorer, and Adobe Reader. Gain valuable insights into auditing sandboxes effectively and understanding the intricacies of Windows security mechanisms, including object security descriptors, access tokens, and resource access checks. Examine various sandboxing approaches, from user-mode implementations to kernel-level protections, and explore the challenges posed by device drivers, file systems, and IPC technologies. Enhance your knowledge of Windows security architecture and improve your ability to identify and mitigate sandbox-related vulnerabilities in applications. Read more

The Windows Sandbox Paradox

nullcon
Add to list