The Windows Sandbox Paradox
Offered By: nullcon via YouTube
Course Description
Overview
Syllabus
Intro
What I'm Going to Talk About
Sandboxing Requirement #1
Typical User-Mode Approach
Object Security Descriptor
Resource Access Check
Owner Check
Kernel DACL Check
Kernel Access Check
Restricted Access Tokens
Restricted Token Access Check
Crash!
Process Initialization
Device Drivers
Opening a Device Name
Securing the Device
Example: Windows Sockets
Native Sockets
Accessing Resources
Direct Resource Access
Sharing Resource Access
Bad Registry
IE EPM Escape / Audio Server
Lack of Documentation
Broker Resource Access
Win32 Path Support
Legacy Filesystem Behaviour
Canonicalization
Device Escape Syntax
Invalid Character Checks
Hybrid Resource Access
Reparse Points
Mixed Semantics
Sharing Sections
Unnamed Resources
IPC Technologies
Named Pipes
Chrome CreateNamed Pipe IPC
Reducing Kernel Attack Surface
The Good Parts
LowBox Token Access Check
Integrity Level Check
Mandatory Integrity Level Checi
Taught by
nullcon
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network