Главная
Study mode:
on
1
Intro
2
Universal Windows Platform
3
Microsoft Edge Architecture
4
Manager Process Startup
5
Activation Information
6
Manager Process Capabilities
7
Content Process Startup
8
black hat Child Process Token and Capabilities
9
Child Process Capability SIDs
10
JIT Engine RPC
11
Out-of-Process COM Activation
12
COM Security
13
LCIE IPC Message Security
14
black hat Launch Browser Broker in Manager
15
Unmarshal Interface
16
Browser Broker Structure
17
Edge Process Integrity
18
Access Check
19
Trusted AC
20
black hat ALL APPLICATION PACKAGES
21
Microsoft Edge Adobe Flash Integration
22
Flash Broker Permissions
23
Flash Broker Activation
24
Flash Broker Features
25
Launch Adobe Connect Add-in
26
A Bug in Macromedia Breeze
27
From Attackers' Perspective
28
Navigate from Internet Zone to Local Zone
29
Behind a Navigation
30
Exploit the SOP Bypass
31
Recap
Description:
Dive deep into the Microsoft Edge security architecture in this Black Hat conference talk, exploring sandbox initialization, browser broker implementation, inter-process communication, and renderer security isolation. Gain insights from security experts who have successfully exploited the browser, as they dissect the Universal Windows Platform, Edge's process structure, and various security mechanisms. Examine topics such as manager and content process startup, child process capabilities, JIT engine RPC, out-of-process COM activation, and Adobe Flash integration. Learn about potential vulnerabilities, including a bug in Macromedia Breeze, and understand how attackers navigate from Internet to Local zones, bypassing Same-Origin Policy restrictions.

Cutting Edge - Microsoft Browser Security — From People Who Owned It

Black Hat
Add to list
0:00 / 0:00