Breaking the Glass Sandbox
Offered By: Recon Conference via YouTube
Course Description
Overview
Explore techniques for discovering reachable code paths and exploitable bugs in Linux kernel sandboxes in this 51-minute conference talk from Recon 2022. Learn how to identify vulnerable kernel components, write simple bug reproducers, and apply these methods for both offensive and defensive purposes. Gain insights into targeting exposed code paths to find valuable bugs, monitoring commits for silent security fixes, and determining the usability of syzbot-reported issues. Discover neat tricks to access more vulnerable code and understand the importance of these techniques in the context of sandboxed environments like Android apps. Walk away with practical knowledge on attack surface reduction, kernel hardening, and identifying kernel components ripe for exploitation.
Syllabus
Recon 2022 - Breaking the Glass Sandbox
Taught by
Recon Conference
Related Courses
Harnessing Intel Processor Trace on Windows for FuzzRecon Conference via YouTube Reverse Engineering Satellite Based IP Content Distribution
Recon Conference via YouTube Reverse Engineering Windows Defender's JavaScript Engine
Recon Conference via YouTube DIY ARM Debugger for Wi-Fi Chips
Recon Conference via YouTube Subverting Your Server Through Its BMC - The HPE iLO4 Case
Recon Conference via YouTube