• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Sandbox – Online, Offline
 

Sandbox – Online, Offline

on

  • 3,008 views

 

Statistics

Views

Total Views
3,008
Views on SlideShare
2,904
Embed Views
104

Actions

Likes
0
Downloads
24
Comments
0

2 Embeds 104

http://thepush.info 113
http://www.linkedin.com 1

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Sandbox – Online, Offline Sandbox – Online, Offline Presentation Transcript

    • Sandbox – Online, Offline
      By Pushkar
      Null-The Open Secuirty Community
    • Sandbox…
      Sandbox may refer to:
      Limited, restricted environment for a specific purpose
      Litter box, an indoor box for cats to relieve themselves
      Sandpit or sandbox, a wide, shallow playground construction to hold sand often made of wood or plastic
      Sandbox (railways), a container that holds sand for use in improving rail adhesion in slippery conditions
      Sandboxing is a popular technique for creating confined execution environments, which could be be used for running untrusted programs. A sandbox limits, or reduces, the level of access its applications have — it is a container
    • Sandbox…
      Sandbox (computer security), a virtual container in which untrusted programs can be safely run
      Sandbox (software development), an online environment in which code or content changes can be tested without affecting the original system
      Sandbox Effect, in Google Internet search rankings
    • How it works…
      Basic two mechanism…
      Namespace isolation
      - agents are unable to manipulate resources that they cannot name.
      Access checks
      - discharge proof obligations of the form “agent A may manipulate resource R by method M“
      Intercepting System calls
      Deny the system call, Audit the system call's invocation, Pre- process the arguments, Post-process the result, Replace the system call's implementation
    • Limitations…
      Sandboxing implementations suffer from five broad kinds of limitation:
      too much isolation
      not enough isolation
      non-portability
      non-usability
      design and implementation failures
    • Google Sandbox…
      Sandbox Effect,
      Technique that google
      uses to ran new website
      in its search results
      Check whether it is a
      genuine or a spam
      website
    • Others…
      Wikipedia Sandbox
      http://en.wikipedia.org/wiki/Wikipedia:Sandbox
      MySQL Sandbox
      http://en.wikipedia.org/wiki/Wikipedia:Sandbox
      Chrome
      http://dev.chromium.org/developers/design-documents/sandbox.
    • Malware Analysis…
      Online
      Anubis http://anubis.iseclab.org/
      BitBlaze https://aerie.cs.berkeley.edu/
      Comodo Instant Malware Analysis 
      http://camas.comodo.com/
      Eureka http://eureka.cyber-ta.org/
      JoeBox http://www.joebox.org/submit.php
      Norman Sandbox
       http://www.norman.com/security_center/security_tools/submit_file/en
      Sunbelt Sandbox: 
      http://www.sunbeltsecurity.com/sandbox/
      ThreatExpert http://www.threatexpert.com/
      Xandora http://www.xandora.net/xangui/
    • Offline…
      Sandboxie http://www.sandboxie.com/index.php?DownloadSandboxie
      Autovin http://autovin.pandasecurity.my/
      IDefenseLabs SysAnalyzer http://labs.idefense.com/software/
      MandiantMemoryze, Red Curtain http://www.mandiant.com/products/free_software
       
    • Additional Tools…
      Buster Sandbox Analyzer http://bsa.isoftware.nl/
      Malware Analyser 2.8 : http://code.google.com/p/malwareanalyzer/
    • Lets check…
    • Thank you…Q&A ????