Главная
Study mode:
on
1
Intro
2
Types of Sandboxes
3
Windows Internals
4
State of Windows Security
5
How does Sandbox work
6
Example
7
OS Enhancement Based Sandbox
8
The Problem
9
First Vulnerability
10
Bypass the Sandbox
11
Buffer Zone Pro Bypass
12
Secret File Bypass
13
Type 2 Sandboxes
14
Type 2 Sandbox
15
Chromium Sandbox
16
Chromium Documentation
17
Chrome Sandbox Demo
18
Can the Sandbox Stand Ground
19
Adobe Reader Exploit
20
Chrome Exploit
21
untrusted integrity level
22
podium contest
23
kernel vulnerability
24
truetype vulnerability
25
duotext vulnerability
26
methodology
27
Truetype vulnerabilities
28
Acrobat Reader
29
Result
30
Windows kernel vulnerabilities
31
Alternatives
32
The Real Solution
Description:
Explore the vulnerabilities and limitations of application sandboxes in this Black Hat EU 2013 conference talk. Dive into the "Sandbox Roulette" as presenters Rafal Wojtczuk and Rahul Kashyap demonstrate various exploit vectors targeting Windows Operating System vulnerabilities and assess how different commercial sandboxes fare against each attack. Gain insights into the growing trend of application sandboxing in enterprise security, the lack of standardization, and the potential risks when malware analysts use sandboxes. Examine the architectural decomposition of sandboxing technologies, comparing different vendor solutions and evaluating their effectiveness in protecting enterprise data and infrastructure. Learn about sophisticated malware techniques likely to target sandboxes in the future, and discover the real solutions to enhance sandbox security.

The Sandbox Roulette - Are You Ready For The Gamble?

Black Hat
Add to list