Sandbox – Online, Offline
Upcoming SlideShare
Loading in...5
×
 

Sandbox – Online, Offline

on

  • 3,150 views

 

Statistics

Views

Total Views
3,150
Views on SlideShare
2,964
Embed Views
186

Actions

Likes
0
Downloads
24
Comments
0

2 Embeds 186

http://thepush.info 185
http://www.linkedin.com 1

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Sandbox – Online, Offline Sandbox – Online, Offline Presentation Transcript

  • Sandbox – Online, Offline
    By Pushkar
    Null-The Open Secuirty Community
  • Sandbox…
    Sandbox may refer to:
    Limited, restricted environment for a specific purpose
    Litter box, an indoor box for cats to relieve themselves
    Sandpit or sandbox, a wide, shallow playground construction to hold sand often made of wood or plastic
    Sandbox (railways), a container that holds sand for use in improving rail adhesion in slippery conditions
    Sandboxing is a popular technique for creating confined execution environments, which could be be used for running untrusted programs. A sandbox limits, or reduces, the level of access its applications have — it is a container
  • Sandbox…
    Sandbox (computer security), a virtual container in which untrusted programs can be safely run
    Sandbox (software development), an online environment in which code or content changes can be tested without affecting the original system
    Sandbox Effect, in Google Internet search rankings
  • How it works…
    Basic two mechanism…
    Namespace isolation
    - agents are unable to manipulate resources that they cannot name.
    Access checks
    - discharge proof obligations of the form “agent A may manipulate resource R by method M“
    Intercepting System calls
    Deny the system call, Audit the system call's invocation, Pre- process the arguments, Post-process the result, Replace the system call's implementation
  • Limitations…
    Sandboxing implementations suffer from five broad kinds of limitation:
    too much isolation
    not enough isolation
    non-portability
    non-usability
    design and implementation failures
  • Google Sandbox…
    Sandbox Effect,
    Technique that google
    uses to ran new website
    in its search results
    Check whether it is a
    genuine or a spam
    website
  • Others…
    Wikipedia Sandbox
    http://en.wikipedia.org/wiki/Wikipedia:Sandbox
    MySQL Sandbox
    http://en.wikipedia.org/wiki/Wikipedia:Sandbox
    Chrome
    http://dev.chromium.org/developers/design-documents/sandbox.
  • Malware Analysis…
    Online
    Anubis http://anubis.iseclab.org/
    BitBlaze https://aerie.cs.berkeley.edu/
    Comodo Instant Malware Analysis 
    http://camas.comodo.com/
    Eureka http://eureka.cyber-ta.org/
    JoeBox http://www.joebox.org/submit.php
    Norman Sandbox
     http://www.norman.com/security_center/security_tools/submit_file/en
    Sunbelt Sandbox: 
    http://www.sunbeltsecurity.com/sandbox/
    ThreatExpert http://www.threatexpert.com/
    Xandora http://www.xandora.net/xangui/
  • Offline…
    Sandboxie http://www.sandboxie.com/index.php?DownloadSandboxie
    Autovin http://autovin.pandasecurity.my/
    IDefenseLabs SysAnalyzer http://labs.idefense.com/software/
    MandiantMemoryze, Red Curtain http://www.mandiant.com/products/free_software
     
  • Additional Tools…
    Buster Sandbox Analyzer http://bsa.isoftware.nl/
    Malware Analyser 2.8 : http://code.google.com/p/malwareanalyzer/
  • Lets check…
  • Thank you…Q&A ????