SlideShare a Scribd company logo
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Practical Sandboxing on
the Windows Platform
An assessment of the Internet Explorer, Adobe
Reader and Google Chrome sandboxes
By Tom Keetch
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
About Me
• Verizon Business
– Lead consultant for Code Review in EMEA
• Previous Presentations
– OWASP AppSec EU 2011 – Practical Sandboxing with Chromium
– CONfidence 2011 - Assessing Practical Sandboxes (Updated)
– BlackHat Europe 2011 – Assessing Practical Sandboxes
– Hack.LU 2010 - Protected Mode Internet Explorer
• Exploit mitigations are my favourite topic!
–How to make exploits prohibitively expensive to find and exploit…
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Introduction

What is Practical Sandboxing?

User-mode sandboxing methodology

Based on Windows OS facilities

Overview of 3 implementations:

Protected Mode Internet Explorer (limited)

Adobe Reader X

Chromium

This presentation is about:

Breaking out of such Sandboxes with the minimum
required effort.
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Agenda
• Sandboxes for exploit mitigation (Theory)
• Overview of Practical Sandboxing
Implementations (Background)
• Sandboxing Flaws (Practical)
• A counter-argument to Adobe’s view of their
sandbox as an exploit mitigation (Argumentative)
• Conclusions
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Sandboxes for Exploit
Mitigation
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Sandboxes for exploit mitigation

Two options for exploit mitigation:

Increase cost of exploitation (DEP, ASLR)

Decrease target value (Sandboxes)

But a second stage exploit, can usually bypass the
sandbox for finite cost...

This presentation focuses on sandbox-escape.

Please read the whitepapers for more information.

Too much to cover in just 1 hour

Come talk to me after!
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
“Return-on-Exploitation”
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Two Potential Failures
1) The cost of bypassing the exploit mitigation is
too low to deter a potential attacker.
• Trivial to bypass?
• High Target Value?
1) The reduction of value of the target is not
sufficient to deter a potential attacker.
• Protecting the wrong assets?
• Some assets cannot be protected by a sandbox.
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Looking for “cheap” exploits

This research set out to find the easiest places to
find sandbox-escape exploits.

Cheap-to-find exploit types were found:

Previously unexposed interfaces

Easily detectable (and exploitable) conditions

Mostly due to incomplete sandbox implementations…

… but also sandbox-specific issues.

Also, resources not protected by sandbox:

Network Access

Resources protected by the Same Origin Policy

Kernel Interfaces
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Overview of Practical
Sandbox Implementations
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
The Practical Sandboxing
Methodology

Restricted Access token

Deny-only SIDs (Discretionary)

Low Integrity (Mandatory)

Privilege Stripping (Capability)

GUI Sub-System Security

Window Station Isolation

Desktop Isolation

Job Object Restrictions
Each mitigates against a different attack!
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
• Session
• WinStation
• Desktop
• Medium Integrity
• Low Integrity
Browser Tab
(Internet Zone)
Browser Tab
(Trusted Zone,
Local Intranet Zone)
Internet Explorer
(Broker)
Protected Mode Internet Explorer
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Protected Mode Internet Explorer
Practical Sandboxing Check-list
OS Control Implemented?
Restricted Token
- Restricted Token No
- Privilege Stripping Yes
- Low Integrity Yes
Job Object Restrictions No
Window Station Isolation No
Desktop Isolation No
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Protected Mode Internet Explorer
Sandboxing

Sandbox Limitations:

Only supported on Vista and later, because only Integrity Levels are used.

Only protected the Integrity of the system, not confidentiality.

Full access to Windows station resources (including Clipboard, GAT).

Many possible sandbox escape routes including:

UAC Launches

Trusted Broker attacks

Generic PMIE bypass for a domain-joined workstation.

More information previously presented at Hack.LU, Oct 2010.

Not a Security Boundary, for many reasons.

Lots of potential elevation routes.
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
• Session
• Medium Integrity
• (Workstation)
• (Desktop)
• Restricted Token
• Low Integrity
• Job Object
PDF Renderer
Adobe Reader
(Broker)
Adobe Reader X
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Adobe Reader X
Practical Sandboxing Check-list
OS Control Implemented?
Restricted Token
- Restricted Token Yes
- Privilege Stripping Yes
- Low Integrity Yes
Job Object Restrictions Partial
Window Station Isolation No
Desktop Isolation No
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Adobe Reader X Sandboxing

Makes use of Chromium sandboxing and IPC
framework (BSD license)

PDF Rendering is sandboxed.

Sandbox Limitations:

The broker does not restrict read access.

Sandbox doesn't protect user’s clipboard

Full Access is granted to the Global Atom Table.

“NT AuthorityRESTRICTED” SID -> BNO Namespace squatting.

No WinSta or Desktop isolation, but compensated
for with Job Object restrictions.

Read Adobe Blog posts for more information.
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
• Session
• Medium Integrity
• Restricted Token
• Low Integrity
• Job Object
Browser Tab
Google Chrome
(Broker)
GPU
Process
Plug-in
• Per plug-in
sandboxing.
Chromium
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Chromium
Practical Sandboxing Check-list
OS Control Implemented?*
Restricted Token
- Restricted Token Yes
- Privilege Stripping Yes
- Low Integrity Yes
Job Object Restrictions Yes
Window Station Isolation Yes
Desktop Isolation Yes
*Renderer sandbox.
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Chromium sandboxing

A flexible framework for applying the full
“practical sandboxing” methodology

Renderer is in the most restrictive possible
sandbox.

3rd
Party Plug-ins are often not sandboxed

Shockwave, Java etc.

Adobe Flash has a *limited* sandbox.

GPU process is not sandboxed
(planned for future release)
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
The VUPEN Exploit (I)
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
The VUPEN Exploit (II)
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
The VUPEN Exploit (III)
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
The Adobe Flash Sandbox
OS Control Implemented?
Restricted Token
- Restricted Token Partial
- Privilege Stripping No
- Low Integrity No
Job Object Restrictions No
Window Station Isolation No
Desktop Isolation No
Bypass using “shatter attacks”!
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Cheap Exploit Vectors
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Cheap Exploit Vector #1
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
BNO Namespace Squatting

Shared sections can be created with a name in the
'Local' namespace

Shared Sections

Mutexes, Events, Semaphores (Synchronisation objects)

By “squatting” on named object, we can set
arbitrary permissions on the object if:

It can be created before the application

If the application does not fail if the named object already exists.

If we know or can predict the name of the object.

This can expose applications outside the sandbox
to attacks they never knew existed…
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
BNO Namespace Squatting –
PMIE Sandbox-Escape
1) Terminate the Medium IL iexplore.exe process.
2) Predict the PID of the new process.
3) Create the “ie_lcie_main_<pid>” shared section.
4) Initialise the section with malicious data.
5) When iexplore.exe initialises LCIE, malicious code
will execute outside of the sandbox.
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
The Fuzzer that found it...
int _tmain(int argc, _TCHAR* argv[])
{
unsigned int size = _tstoi(argv[2]);
HANDLE hSection = CreateFileMapping(NULL, NULL, PAGE_EXECUTE_READWRITE, 0, size, argv[1]);
unsigned char* lpBuff = (unsigned char*) MapViewOfFile(hSection, FILE_MAP_WRITE | FILE_MAP_READ, 0, 0, size);
// Take a copy of the initial contents of the section.
memcpy(init, lpBuff, size);
while(1)
{
memcpy(lpBuff, init, sizeof(init));
for(unsigned int i = 32; i < size; i++)
if(rand() % 1000 < 5 ) lpBuff[i] = (unsigned char) rand();
PROCESS_INFORMATION ProcInfo1 = {0};
STARTUPINFOA StartupInfo1 = {0};
CreateProcessA(NULL, "C:Program FilesInternet Exploreriexplore.exe", NULL, NULL, FALSE, 0, NULL, NULL,&StartupInfo1, &ProcInfo1);
CloseHandle(ProcInfo1.hProcess);
CloseHandle(ProcInfo1.hThread);
Sleep(2000);
PROCESS_INFORMATION ProcInfo2 = {0};
STARTUPINFOA StartupInfo2 = {0};
CreateProcessA(NULL, "pskill iexplore.exe", NULL, NULL, FALSE, 0, NULL, NULL, &StartupInfo2, &ProcInfo2);
CloseHandle(ProcInfo2.hProcess);
CloseHandle(ProcInfo2.hThread);
Sleep(1000);
}
return 0;
}
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
MSRC’s Response
“As we are able to reproduce the crashes I have
asked the Internet Explorer product team to
address this issue in a next release of IE, which
will most likely be IE10 rather than IE9 as that
version is pretty much complete”
…
“We decided to close the case because Protected
Mode IE is not presently a security boundary, thus
a sandbox escaping is not considered a security
vulnerability.”
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
BNO Namespace Squatting –
Other Practical Sandboxes
• Exploitable from Protected Mode IE
–Low Integrity only
• Exploitable from Adobe Reader X
–Process Token has “NT AUTHORITYRESTRICTED”
–Grants access to create objects in Local BNO
•Not Exploitable from Chrome Renderer sandbox
–“Naked” Process Token.
•But if Microsoft won’t fix this bug until IE 10?
– How many more similar vulnerabilities are there?
– Adobe Reader and other incomplete implementations will remain
vulnerable to BNO Namespace Squatting issues.
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Cheap Exploit #2
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
NPAPI Interface Exploits
(Chromium Specific)

NPAPI was originally used to interface between
the Netscape browser and an in-process plug-in.
Browser
NPAPI Plug-in
(DLL)NPAPI
Process
Browser Tab
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Out-of-Process NPAPI

Later NPAPI crossed process boundaries

Improved stability, no improved security.
Browser Tab
(Process)
Google Chrome
(Broker Process)
Trusted
Plug-in
(Process)
NPAPI
Session
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
NPAPI In Chrome (Today)
Browser Tab
(Process)
Google Chrome
(Broker Process)
Trusted
Plug-in
(Process)
NPAPI
Sandbox
Session
• NPAPI now crosses a security boundary between
sandboxed tabs and un-sandboxed plug-ins.
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
NPAPI Exploits

NPAPI Callers were previously trusted...

...Now they are not.

Flash and other plug-ins are currently not
securely sandboxed.

Exploitable bugs in Adobe (and other vendors)
code will allow sandbox-escape.

But these bugs were previously not vulnerabilities
→ Implicit Calling conventions?
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
A benign crash?
• Thread 9 *CRASHED* ( EXCEPTION_ACCESS_VIOLATION @ 0x09ccf232 )
0x102e5c06 [NPSWF32.dll - memcpy.asm:257] memcpy
0x102e1828 [NPSWF32.dll + 0x002e1828] CBitStream::Fill(unsigned char const*, int)
0x102e0b96 [NPSWF32.dll + 0x002e0b96] mp3decFill
0x102e0892 [NPSWF32.dll + 0x002e0892] PlatformMp3Decoder::Refill(int,unsigned char*)
0x10063d21 [NPSWF32.dll + 0x00063d21] CMp3Decomp::GetDecompressedData(short*,int,int,int,int)
0x10063f62 [NPSWF32.dll + 0x00063f62] CMp3Decomp::Decompress(short *,int)
0x100ad448 [NPSWF32.dll + 0x000ad448] CoreSoundMix::BuildBuffer(int)
0x100ae2c5 [NPSWF32.dll + 0x000ae2c5] CoreSoundMix::SendBuffer(int,int)
0x10153d6b [NPSWF32.dll + 0x00153d6b] PlatformSoundMix::SoundThread()
0x10154034 [NPSWF32.dll + 0x00154034] PlatformSoundMix::SoundThreadFunc(void *)
0x7c80b728 [kernel32.dll + 0x0000b728] BaseThreadStart
Full report @ http://crash/reportdetail?reportid=b370c132fc6587f7
Google Chrome 4.0.249.70 (Official Build 36218)

This was found by accident (using Chromium)

Fixed by Adobe!
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Input events

Can also send key and mouse events.

NPP_InputEvent().

Possible to bypass Flash Security Dialogs

Enable web-cam

Enable Microphone

Plug-ins are currently unable to distinguish
between user input and simulated input from
renderer.

Hopefully this is fixed in “Pepper”.
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Cheap Exploit #3
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Handle Leaks

Handles which refer to privileged resources may
exist in sandboxes for several reasons.

A handle can be used for any operation for which it
has already been granted access.

If the right type of handle is leaked into the
sandbox, it can be used for sandbox-escape.

These handles are easily detected at run-time!
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
What causes “Handle Leaks”?

Deliberately granted by broker.

Accidentally granted by broker.

Incorrectly granted by broker (policy error)

Unclosed handles from sandbox initialisation

Before Lock-down (init. with unrestricted token)

Internal handles kept open by libraries

Internal handles kept open by 3rd
Party Hook DLLs

Libraries in use must be “sandbox friendly”
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Adobe Reader X Handle Leaks

Sandboxed renderer has write access to the
Medium-integrity Internet Explorer cookie store,
history etc.

The ARX broker also doesn't currently restrict read
access to local file system.
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Cheap Exploit #4
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Clipboard Attacks

In PMIE and AR-X, the clipboard is shared between
the sandbox and the rest of the user's session.

Ever put your password in the clipboard?

What about attacking other applications?

Previously, the clipboard contents were normally
trustworthy, now they are not.
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Clipboard Attacks

What about...

Pasting malicious command lines into a shell followed
by a new line?

Inputting maliciously formatted data into the
clipboard?

Do application developers implicitly trust clipboard
contents?
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
A counter-argument to Adobe’s
view of the sandbox
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Conclusions
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Conclusions

Developing sandbox escape exploits varies
considerably between different implementations

Secondary (local) exploits cheaper to find and
develop than the primary (remote) exploit.

Not necessarily a big disincentive for attackers.

Especially if the goal is to steal a resource
available inside the sandbox!
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Relative Security of Sandbox Implementations
Google Chrome Renderer
Adobe Reader X
Protected Mode Internet Explorer
Google Chrome Flash Plug-in
Privilege Stripping
No Sandbox
More Protection
Less Protection
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Conclusions

Sandboxes have changed the exploitation
landscape and will continue to do so

Greater emphasis on local privilege escalation

Desktop applications under greater scrutiny

New attack surfaces

When forced to attackers will start to adopt
sandbox-aware malware.

Insufficient motivation to do so yet!

PMIE sandbox escapes only started getting attention
when Pwn2Own made it a requirement of “own”.

There are now at least 4 un-patched PMIE escapes
(source: Twitter).
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Any Questions?
Twitter: @tkeetch
tom.keetch@uk.verizonbusiness.com
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
More information
• My OWASP AppSec EU Slides
– http://www.owasp.org/index.php/AppSecEU2011
• My Black Hat Briefings Europe 2011 Materials
– https://blackhat.com/html/bh-eu-11/bh-eu-11-archives.html#Keetch
• My Protected Mode IE Whitepaper
– http://www.verizonbusiness.com/resources/whitepapers/wp_escapingmicrosoftprotectedmodeinte
rnetexplorer_en_xg.pdf
• My Hack.LU 2010 Presentation on Protected Mode IE
– http://archive.hack.lu/2010/Keetch-Escaping-from-Protected-Mode-Internet-Explorer-slides.ppt
• Richard Johnson: “Adobe Reader X: A Castle Built on Sand”
– http://rjohnson.uninformed.org/Presentations/A%20Castle%20Made%20of%20Sand%20-
%20final.pdf
• Stephen Ridley: “Escaping the Sandbox”
– http://www.recon.cx/2010/slides/Escaping_The_Sandbox_Stephen_A_Ridley_2010.pdf
• Skywing: “Getting out of Jail: Escaping Internet Explorer Protected Mode”
– http://www.uninformed.org/?v=8&a=6&t=sumry

More Related Content

What's hot

NCC Group 44Con Workshop: How to assess and secure ios apps
NCC Group 44Con Workshop: How to assess and secure ios appsNCC Group 44Con Workshop: How to assess and secure ios apps
NCC Group 44Con Workshop: How to assess and secure ios appsNCC Group
 
Windows Operating System Archaeology
Windows Operating System ArchaeologyWindows Operating System Archaeology
Windows Operating System Archaeology
enigma0x3
 
Defcon 22-david-wyde-client-side-http-cookie-security
Defcon 22-david-wyde-client-side-http-cookie-securityDefcon 22-david-wyde-client-side-http-cookie-security
Defcon 22-david-wyde-client-side-http-cookie-securityPriyanka Aash
 
UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...
UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...
UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...
Vincent Giersch
 
CSW2017 Geshev+Miller logic bug hunting in chrome on android
CSW2017 Geshev+Miller logic bug hunting in chrome on androidCSW2017 Geshev+Miller logic bug hunting in chrome on android
CSW2017 Geshev+Miller logic bug hunting in chrome on android
CanSecWest
 
Poc2015 os x_kernel_is_as_strong_as_its_weakest_part_liang_shuaitian
Poc2015 os x_kernel_is_as_strong_as_its_weakest_part_liang_shuaitianPoc2015 os x_kernel_is_as_strong_as_its_weakest_part_liang_shuaitian
Poc2015 os x_kernel_is_as_strong_as_its_weakest_part_liang_shuaitian
Liang Chen
 
Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nak...
Revealing the Attack Operations Targeting Japan by  Shusei Tomonaga & Yuu Nak...Revealing the Attack Operations Targeting Japan by  Shusei Tomonaga & Yuu Nak...
Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nak...
CODE BLUE
 
The Dark Side of PowerShell by George Dobrea
The Dark Side of PowerShell by George DobreaThe Dark Side of PowerShell by George Dobrea
The Dark Side of PowerShell by George Dobrea
EC-Council
 
Html5 hacking
Html5 hackingHtml5 hacking
Html5 hacking
Iftach Ian Amit
 
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
BlueHat Security Conference
 
Горизонтальные перемещения в инфраструктуре Windows
Горизонтальные перемещения в инфраструктуре WindowsГоризонтальные перемещения в инфраструктуре Windows
Горизонтальные перемещения в инфраструктуре Windows
Positive Hack Days
 
CSW2017Richard Johnson_harnessing intel processor trace on windows for vulner...
CSW2017Richard Johnson_harnessing intel processor trace on windows for vulner...CSW2017Richard Johnson_harnessing intel processor trace on windows for vulner...
CSW2017Richard Johnson_harnessing intel processor trace on windows for vulner...
CanSecWest
 
CNIT 126 Ch 11: Malware Behavior
CNIT 126 Ch 11: Malware BehaviorCNIT 126 Ch 11: Malware Behavior
CNIT 126 Ch 11: Malware Behavior
Sam Bowne
 
BlueHat v17 || Dangerous Contents - Securing .Net Deserialization
BlueHat v17 || Dangerous Contents - Securing .Net Deserialization BlueHat v17 || Dangerous Contents - Securing .Net Deserialization
BlueHat v17 || Dangerous Contents - Securing .Net Deserialization
BlueHat Security Conference
 
Andy Davis' Black Hat USA Presentation Revealing embedded fingerprints
Andy Davis' Black Hat USA Presentation Revealing embedded fingerprintsAndy Davis' Black Hat USA Presentation Revealing embedded fingerprints
Andy Davis' Black Hat USA Presentation Revealing embedded fingerprintsNCC Group
 
Oracle Database 12c Attack Vectors
Oracle Database 12c Attack VectorsOracle Database 12c Attack Vectors
Oracle Database 12c Attack Vectors
Martin Toshev
 
CNIT 128 9. Writing Secure Android Applications
CNIT 128 9. Writing Secure Android ApplicationsCNIT 128 9. Writing Secure Android Applications
CNIT 128 9. Writing Secure Android Applications
Sam Bowne
 
Kochetova+osipv atm how_to_make_the_fraud__final
Kochetova+osipv atm how_to_make_the_fraud__finalKochetova+osipv atm how_to_make_the_fraud__final
Kochetova+osipv atm how_to_make_the_fraud__final
PacSecJP
 
Заполучили права администратора домена? Игра еще не окончена
Заполучили права администратора домена? Игра еще не оконченаЗаполучили права администратора домена? Игра еще не окончена
Заполучили права администратора домена? Игра еще не окончена
Positive Hack Days
 
Kasza smashing the_jars
Kasza smashing the_jarsKasza smashing the_jars
Kasza smashing the_jars
PacSecJP
 

What's hot (20)

NCC Group 44Con Workshop: How to assess and secure ios apps
NCC Group 44Con Workshop: How to assess and secure ios appsNCC Group 44Con Workshop: How to assess and secure ios apps
NCC Group 44Con Workshop: How to assess and secure ios apps
 
Windows Operating System Archaeology
Windows Operating System ArchaeologyWindows Operating System Archaeology
Windows Operating System Archaeology
 
Defcon 22-david-wyde-client-side-http-cookie-security
Defcon 22-david-wyde-client-side-http-cookie-securityDefcon 22-david-wyde-client-side-http-cookie-security
Defcon 22-david-wyde-client-side-http-cookie-security
 
UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...
UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...
UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...
 
CSW2017 Geshev+Miller logic bug hunting in chrome on android
CSW2017 Geshev+Miller logic bug hunting in chrome on androidCSW2017 Geshev+Miller logic bug hunting in chrome on android
CSW2017 Geshev+Miller logic bug hunting in chrome on android
 
Poc2015 os x_kernel_is_as_strong_as_its_weakest_part_liang_shuaitian
Poc2015 os x_kernel_is_as_strong_as_its_weakest_part_liang_shuaitianPoc2015 os x_kernel_is_as_strong_as_its_weakest_part_liang_shuaitian
Poc2015 os x_kernel_is_as_strong_as_its_weakest_part_liang_shuaitian
 
Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nak...
Revealing the Attack Operations Targeting Japan by  Shusei Tomonaga & Yuu Nak...Revealing the Attack Operations Targeting Japan by  Shusei Tomonaga & Yuu Nak...
Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nak...
 
The Dark Side of PowerShell by George Dobrea
The Dark Side of PowerShell by George DobreaThe Dark Side of PowerShell by George Dobrea
The Dark Side of PowerShell by George Dobrea
 
Html5 hacking
Html5 hackingHtml5 hacking
Html5 hacking
 
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
 
Горизонтальные перемещения в инфраструктуре Windows
Горизонтальные перемещения в инфраструктуре WindowsГоризонтальные перемещения в инфраструктуре Windows
Горизонтальные перемещения в инфраструктуре Windows
 
CSW2017Richard Johnson_harnessing intel processor trace on windows for vulner...
CSW2017Richard Johnson_harnessing intel processor trace on windows for vulner...CSW2017Richard Johnson_harnessing intel processor trace on windows for vulner...
CSW2017Richard Johnson_harnessing intel processor trace on windows for vulner...
 
CNIT 126 Ch 11: Malware Behavior
CNIT 126 Ch 11: Malware BehaviorCNIT 126 Ch 11: Malware Behavior
CNIT 126 Ch 11: Malware Behavior
 
BlueHat v17 || Dangerous Contents - Securing .Net Deserialization
BlueHat v17 || Dangerous Contents - Securing .Net Deserialization BlueHat v17 || Dangerous Contents - Securing .Net Deserialization
BlueHat v17 || Dangerous Contents - Securing .Net Deserialization
 
Andy Davis' Black Hat USA Presentation Revealing embedded fingerprints
Andy Davis' Black Hat USA Presentation Revealing embedded fingerprintsAndy Davis' Black Hat USA Presentation Revealing embedded fingerprints
Andy Davis' Black Hat USA Presentation Revealing embedded fingerprints
 
Oracle Database 12c Attack Vectors
Oracle Database 12c Attack VectorsOracle Database 12c Attack Vectors
Oracle Database 12c Attack Vectors
 
CNIT 128 9. Writing Secure Android Applications
CNIT 128 9. Writing Secure Android ApplicationsCNIT 128 9. Writing Secure Android Applications
CNIT 128 9. Writing Secure Android Applications
 
Kochetova+osipv atm how_to_make_the_fraud__final
Kochetova+osipv atm how_to_make_the_fraud__finalKochetova+osipv atm how_to_make_the_fraud__final
Kochetova+osipv atm how_to_make_the_fraud__final
 
Заполучили права администратора домена? Игра еще не окончена
Заполучили права администратора домена? Игра еще не оконченаЗаполучили права администратора домена? Игра еще не окончена
Заполучили права администратора домена? Игра еще не окончена
 
Kasza smashing the_jars
Kasza smashing the_jarsKasza smashing the_jars
Kasza smashing the_jars
 

Viewers also liked

Secure and Simple Sandboxing in SELinux
Secure and Simple Sandboxing in SELinuxSecure and Simple Sandboxing in SELinux
Secure and Simple Sandboxing in SELinux
James Morris
 
Sandboxing in .NET CLR
Sandboxing in .NET CLRSandboxing in .NET CLR
Sandboxing in .NET CLR
Mikhail Shcherbakov
 
File Transfer protocols
File Transfer protocolsFile Transfer protocols
File Transfer protocols
Aayushi Pareek
 
Ceh v5 module 07 sniffers
Ceh v5 module 07 sniffersCeh v5 module 07 sniffers
Ceh v5 module 07 sniffers
Vi Tính Hoàng Nam
 
Nmap(network mapping)
Nmap(network mapping)Nmap(network mapping)
Nmap(network mapping)
SSASIT
 
Content Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat ProtectionContent Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat Protection
Blue Coat
 
Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101
Blue Coat
 
File transfer protocol
File transfer protocolFile transfer protocol
File transfer protocolMilind Swane
 
Sandbox vs manual malware analysis v1.1
Sandbox vs manual malware analysis v1.1Sandbox vs manual malware analysis v1.1
Sandbox vs manual malware analysis v1.1
Michael Gough
 
Remote network monitoring
Remote network monitoringRemote network monitoring
Remote network monitoring
yousef emami
 
Nmap not only a port scanner by ravi rajput comexpo security awareness meet
Nmap not only a port scanner by ravi rajput comexpo security awareness meet Nmap not only a port scanner by ravi rajput comexpo security awareness meet
Nmap not only a port scanner by ravi rajput comexpo security awareness meet
Ravi Rajput
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
Bharat Thakkar
 
Introduction to SNMP
Introduction to SNMPIntroduction to SNMP
Introduction to SNMP
Mohammed Farrah
 
Network scanning
Network scanningNetwork scanning
Network scanning
oceanofwebs
 
Understanding NMAP
Understanding NMAPUnderstanding NMAP
Understanding NMAP
Phannarith Ou, G-CISO
 
Port Scanning
Port ScanningPort Scanning
Port Scanning
amiable_indian
 
Hacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning TechniquesHacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning Techniquesamiable_indian
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An IntroductionJayaseelan Vejayon
 

Viewers also liked (20)

Secure and Simple Sandboxing in SELinux
Secure and Simple Sandboxing in SELinuxSecure and Simple Sandboxing in SELinux
Secure and Simple Sandboxing in SELinux
 
Sandboxing in .NET CLR
Sandboxing in .NET CLRSandboxing in .NET CLR
Sandboxing in .NET CLR
 
File Transfer protocols
File Transfer protocolsFile Transfer protocols
File Transfer protocols
 
Ceh v5 module 07 sniffers
Ceh v5 module 07 sniffersCeh v5 module 07 sniffers
Ceh v5 module 07 sniffers
 
Nmap(network mapping)
Nmap(network mapping)Nmap(network mapping)
Nmap(network mapping)
 
Content Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat ProtectionContent Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat Protection
 
Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101
 
File transfer protocol
File transfer protocolFile transfer protocol
File transfer protocol
 
Sandbox vs manual malware analysis v1.1
Sandbox vs manual malware analysis v1.1Sandbox vs manual malware analysis v1.1
Sandbox vs manual malware analysis v1.1
 
Remote network monitoring
Remote network monitoringRemote network monitoring
Remote network monitoring
 
Nmap not only a port scanner by ravi rajput comexpo security awareness meet
Nmap not only a port scanner by ravi rajput comexpo security awareness meet Nmap not only a port scanner by ravi rajput comexpo security awareness meet
Nmap not only a port scanner by ravi rajput comexpo security awareness meet
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Introduction to SNMP
Introduction to SNMPIntroduction to SNMP
Introduction to SNMP
 
Network scanning
Network scanningNetwork scanning
Network scanning
 
Understanding NMAP
Understanding NMAPUnderstanding NMAP
Understanding NMAP
 
Port Scanning
Port ScanningPort Scanning
Port Scanning
 
Nmap Basics
Nmap BasicsNmap Basics
Nmap Basics
 
Hacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning TechniquesHacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning Techniques
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
ETHICAL HACKING PPT
ETHICAL HACKING PPTETHICAL HACKING PPT
ETHICAL HACKING PPT
 

Similar to Hack In Paris 2011 - Practical Sandboxing

Blackhat EU 2011 - Practical Sandboxing
Blackhat EU 2011 - Practical SandboxingBlackhat EU 2011 - Practical Sandboxing
Blackhat EU 2011 - Practical Sandboxing
Tom Keetch
 
Derbycon Bromium Labs: Sandboxes
Derbycon Bromium Labs: SandboxesDerbycon Bromium Labs: Sandboxes
Derbycon Bromium Labs: Sandboxes
Bromium Labs
 
CONFidence 2015: Nietypowe problemy bezpieczeństwa w aplikacjach webowych - M...
CONFidence 2015: Nietypowe problemy bezpieczeństwa w aplikacjach webowych - M...CONFidence 2015: Nietypowe problemy bezpieczeństwa w aplikacjach webowych - M...
CONFidence 2015: Nietypowe problemy bezpieczeństwa w aplikacjach webowych - M...
PROIDEA
 
Learning, Analyzing and Protecting Android with TOMOYO Linux (JLS2009)
Learning, Analyzing and Protecting Android with TOMOYO Linux (JLS2009)Learning, Analyzing and Protecting Android with TOMOYO Linux (JLS2009)
Learning, Analyzing and Protecting Android with TOMOYO Linux (JLS2009)
Toshiharu Harada, Ph.D
 
Cooking security sans@night
Cooking security sans@nightCooking security sans@night
Cooking security sans@nightjtimberman
 
Sjug aug 2010_cloud
Sjug aug 2010_cloudSjug aug 2010_cloud
Sjug aug 2010_cloud
Michael Neale
 
stackconf 2022: It’s Time to Debloat the Cloud with Unikraft
stackconf 2022: It’s Time to Debloat the Cloud with Unikraftstackconf 2022: It’s Time to Debloat the Cloud with Unikraft
stackconf 2022: It’s Time to Debloat the Cloud with Unikraft
NETWAYS
 
Deep inside TOMOYO Linux
Deep inside TOMOYO LinuxDeep inside TOMOYO Linux
Deep inside TOMOYO Linux
Toshiharu Harada, Ph.D
 
Automated Malware Analysis and Cyber Security Intelligence
Automated Malware Analysis and Cyber Security IntelligenceAutomated Malware Analysis and Cyber Security Intelligence
Automated Malware Analysis and Cyber Security Intelligence
Jason Choi
 
Flash security past_present_future_final_en
Flash security past_present_future_final_enFlash security past_present_future_final_en
Flash security past_present_future_final_en
Sunghun Kim
 
Window Shopping Browser - Bug Hunting in 2012
Window Shopping Browser - Bug Hunting in 2012Window Shopping Browser - Bug Hunting in 2012
Window Shopping Browser - Bug Hunting in 2012
Roberto Suggi Liverani
 
Zerovm backgroud
Zerovm backgroudZerovm backgroud
Zerovm backgroud
UT, San Antonio
 
BlueHat v17 || Out of the Truman Show: VM Escape in VMware Gracefully
BlueHat v17 || Out of the Truman Show: VM Escape in VMware Gracefully BlueHat v17 || Out of the Truman Show: VM Escape in VMware Gracefully
BlueHat v17 || Out of the Truman Show: VM Escape in VMware Gracefully
BlueHat Security Conference
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
Samy Fodil
 
Breaking Extreme Networks WingOS: How to own millions of devices running on A...
Breaking Extreme Networks WingOS: How to own millions of devices running on A...Breaking Extreme Networks WingOS: How to own millions of devices running on A...
Breaking Extreme Networks WingOS: How to own millions of devices running on A...
Priyanka Aash
 
" Breaking Extreme Networks WingOS: How to own millions of devices running on...
" Breaking Extreme Networks WingOS: How to own millions of devices running on..." Breaking Extreme Networks WingOS: How to own millions of devices running on...
" Breaking Extreme Networks WingOS: How to own millions of devices running on...
PROIDEA
 
Quick and Easy Device Drivers for Embedded Linux Using UIO
Quick and Easy Device Drivers for Embedded Linux Using UIOQuick and Easy Device Drivers for Embedded Linux Using UIO
Quick and Easy Device Drivers for Embedded Linux Using UIO
Chris Simmonds
 
Stage 1 Tradecraft
Stage 1 TradecraftStage 1 Tradecraft
Stage 1 Tradecraft
matt806068
 
Hack.lu 09 ip-morph
Hack.lu 09 ip-morphHack.lu 09 ip-morph
Hack.lu 09 ip-morphSteph Cliche
 
US-13-Singh-Hot-Knives-Through-Butter-Evading-File-Based-Sandboxes-Slides
US-13-Singh-Hot-Knives-Through-Butter-Evading-File-Based-Sandboxes-SlidesUS-13-Singh-Hot-Knives-Through-Butter-Evading-File-Based-Sandboxes-Slides
US-13-Singh-Hot-Knives-Through-Butter-Evading-File-Based-Sandboxes-SlidesAbhishek Singh
 

Similar to Hack In Paris 2011 - Practical Sandboxing (20)

Blackhat EU 2011 - Practical Sandboxing
Blackhat EU 2011 - Practical SandboxingBlackhat EU 2011 - Practical Sandboxing
Blackhat EU 2011 - Practical Sandboxing
 
Derbycon Bromium Labs: Sandboxes
Derbycon Bromium Labs: SandboxesDerbycon Bromium Labs: Sandboxes
Derbycon Bromium Labs: Sandboxes
 
CONFidence 2015: Nietypowe problemy bezpieczeństwa w aplikacjach webowych - M...
CONFidence 2015: Nietypowe problemy bezpieczeństwa w aplikacjach webowych - M...CONFidence 2015: Nietypowe problemy bezpieczeństwa w aplikacjach webowych - M...
CONFidence 2015: Nietypowe problemy bezpieczeństwa w aplikacjach webowych - M...
 
Learning, Analyzing and Protecting Android with TOMOYO Linux (JLS2009)
Learning, Analyzing and Protecting Android with TOMOYO Linux (JLS2009)Learning, Analyzing and Protecting Android with TOMOYO Linux (JLS2009)
Learning, Analyzing and Protecting Android with TOMOYO Linux (JLS2009)
 
Cooking security sans@night
Cooking security sans@nightCooking security sans@night
Cooking security sans@night
 
Sjug aug 2010_cloud
Sjug aug 2010_cloudSjug aug 2010_cloud
Sjug aug 2010_cloud
 
stackconf 2022: It’s Time to Debloat the Cloud with Unikraft
stackconf 2022: It’s Time to Debloat the Cloud with Unikraftstackconf 2022: It’s Time to Debloat the Cloud with Unikraft
stackconf 2022: It’s Time to Debloat the Cloud with Unikraft
 
Deep inside TOMOYO Linux
Deep inside TOMOYO LinuxDeep inside TOMOYO Linux
Deep inside TOMOYO Linux
 
Automated Malware Analysis and Cyber Security Intelligence
Automated Malware Analysis and Cyber Security IntelligenceAutomated Malware Analysis and Cyber Security Intelligence
Automated Malware Analysis and Cyber Security Intelligence
 
Flash security past_present_future_final_en
Flash security past_present_future_final_enFlash security past_present_future_final_en
Flash security past_present_future_final_en
 
Window Shopping Browser - Bug Hunting in 2012
Window Shopping Browser - Bug Hunting in 2012Window Shopping Browser - Bug Hunting in 2012
Window Shopping Browser - Bug Hunting in 2012
 
Zerovm backgroud
Zerovm backgroudZerovm backgroud
Zerovm backgroud
 
BlueHat v17 || Out of the Truman Show: VM Escape in VMware Gracefully
BlueHat v17 || Out of the Truman Show: VM Escape in VMware Gracefully BlueHat v17 || Out of the Truman Show: VM Escape in VMware Gracefully
BlueHat v17 || Out of the Truman Show: VM Escape in VMware Gracefully
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Breaking Extreme Networks WingOS: How to own millions of devices running on A...
Breaking Extreme Networks WingOS: How to own millions of devices running on A...Breaking Extreme Networks WingOS: How to own millions of devices running on A...
Breaking Extreme Networks WingOS: How to own millions of devices running on A...
 
" Breaking Extreme Networks WingOS: How to own millions of devices running on...
" Breaking Extreme Networks WingOS: How to own millions of devices running on..." Breaking Extreme Networks WingOS: How to own millions of devices running on...
" Breaking Extreme Networks WingOS: How to own millions of devices running on...
 
Quick and Easy Device Drivers for Embedded Linux Using UIO
Quick and Easy Device Drivers for Embedded Linux Using UIOQuick and Easy Device Drivers for Embedded Linux Using UIO
Quick and Easy Device Drivers for Embedded Linux Using UIO
 
Stage 1 Tradecraft
Stage 1 TradecraftStage 1 Tradecraft
Stage 1 Tradecraft
 
Hack.lu 09 ip-morph
Hack.lu 09 ip-morphHack.lu 09 ip-morph
Hack.lu 09 ip-morph
 
US-13-Singh-Hot-Knives-Through-Butter-Evading-File-Based-Sandboxes-Slides
US-13-Singh-Hot-Knives-Through-Butter-Evading-File-Based-Sandboxes-SlidesUS-13-Singh-Hot-Knives-Through-Butter-Evading-File-Based-Sandboxes-Slides
US-13-Singh-Hot-Knives-Through-Butter-Evading-File-Based-Sandboxes-Slides
 

Recently uploaded

Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Shahin Sheidaei
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
Philip Schwarz
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
AMB-Review
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Globus
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
rickgrimesss22
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
Neo4j
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
Georgi Kodinov
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Neo4j
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
takuyayamamoto1800
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
Fermin Galan
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
Boni García
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
Globus
 
Top 7 Unique WhatsApp API Benefits | Saudi Arabia
Top 7 Unique WhatsApp API Benefits | Saudi ArabiaTop 7 Unique WhatsApp API Benefits | Saudi Arabia
Top 7 Unique WhatsApp API Benefits | Saudi Arabia
Yara Milbes
 

Recently uploaded (20)

Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
 
Top 7 Unique WhatsApp API Benefits | Saudi Arabia
Top 7 Unique WhatsApp API Benefits | Saudi ArabiaTop 7 Unique WhatsApp API Benefits | Saudi Arabia
Top 7 Unique WhatsApp API Benefits | Saudi Arabia
 

Hack In Paris 2011 - Practical Sandboxing

  • 1. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Practical Sandboxing on the Windows Platform An assessment of the Internet Explorer, Adobe Reader and Google Chrome sandboxes By Tom Keetch
  • 2. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 About Me • Verizon Business – Lead consultant for Code Review in EMEA • Previous Presentations – OWASP AppSec EU 2011 – Practical Sandboxing with Chromium – CONfidence 2011 - Assessing Practical Sandboxes (Updated) – BlackHat Europe 2011 – Assessing Practical Sandboxes – Hack.LU 2010 - Protected Mode Internet Explorer • Exploit mitigations are my favourite topic! –How to make exploits prohibitively expensive to find and exploit…
  • 3. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Introduction  What is Practical Sandboxing?  User-mode sandboxing methodology  Based on Windows OS facilities  Overview of 3 implementations:  Protected Mode Internet Explorer (limited)  Adobe Reader X  Chromium  This presentation is about:  Breaking out of such Sandboxes with the minimum required effort.
  • 4. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Agenda • Sandboxes for exploit mitigation (Theory) • Overview of Practical Sandboxing Implementations (Background) • Sandboxing Flaws (Practical) • A counter-argument to Adobe’s view of their sandbox as an exploit mitigation (Argumentative) • Conclusions
  • 5. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Sandboxes for Exploit Mitigation
  • 6. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Sandboxes for exploit mitigation  Two options for exploit mitigation:  Increase cost of exploitation (DEP, ASLR)  Decrease target value (Sandboxes)  But a second stage exploit, can usually bypass the sandbox for finite cost...  This presentation focuses on sandbox-escape.  Please read the whitepapers for more information.  Too much to cover in just 1 hour  Come talk to me after!
  • 7. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 “Return-on-Exploitation”
  • 8. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Two Potential Failures 1) The cost of bypassing the exploit mitigation is too low to deter a potential attacker. • Trivial to bypass? • High Target Value? 1) The reduction of value of the target is not sufficient to deter a potential attacker. • Protecting the wrong assets? • Some assets cannot be protected by a sandbox.
  • 9. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
  • 10. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Looking for “cheap” exploits  This research set out to find the easiest places to find sandbox-escape exploits.  Cheap-to-find exploit types were found:  Previously unexposed interfaces  Easily detectable (and exploitable) conditions  Mostly due to incomplete sandbox implementations…  … but also sandbox-specific issues.  Also, resources not protected by sandbox:  Network Access  Resources protected by the Same Origin Policy  Kernel Interfaces
  • 11. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Overview of Practical Sandbox Implementations
  • 12. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 The Practical Sandboxing Methodology  Restricted Access token  Deny-only SIDs (Discretionary)  Low Integrity (Mandatory)  Privilege Stripping (Capability)  GUI Sub-System Security  Window Station Isolation  Desktop Isolation  Job Object Restrictions Each mitigates against a different attack!
  • 13. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 • Session • WinStation • Desktop • Medium Integrity • Low Integrity Browser Tab (Internet Zone) Browser Tab (Trusted Zone, Local Intranet Zone) Internet Explorer (Broker) Protected Mode Internet Explorer
  • 14. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Protected Mode Internet Explorer Practical Sandboxing Check-list OS Control Implemented? Restricted Token - Restricted Token No - Privilege Stripping Yes - Low Integrity Yes Job Object Restrictions No Window Station Isolation No Desktop Isolation No
  • 15. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Protected Mode Internet Explorer Sandboxing  Sandbox Limitations:  Only supported on Vista and later, because only Integrity Levels are used.  Only protected the Integrity of the system, not confidentiality.  Full access to Windows station resources (including Clipboard, GAT).  Many possible sandbox escape routes including:  UAC Launches  Trusted Broker attacks  Generic PMIE bypass for a domain-joined workstation.  More information previously presented at Hack.LU, Oct 2010.  Not a Security Boundary, for many reasons.  Lots of potential elevation routes.
  • 16. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 • Session • Medium Integrity • (Workstation) • (Desktop) • Restricted Token • Low Integrity • Job Object PDF Renderer Adobe Reader (Broker) Adobe Reader X
  • 17. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Adobe Reader X Practical Sandboxing Check-list OS Control Implemented? Restricted Token - Restricted Token Yes - Privilege Stripping Yes - Low Integrity Yes Job Object Restrictions Partial Window Station Isolation No Desktop Isolation No
  • 18. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Adobe Reader X Sandboxing  Makes use of Chromium sandboxing and IPC framework (BSD license)  PDF Rendering is sandboxed.  Sandbox Limitations:  The broker does not restrict read access.  Sandbox doesn't protect user’s clipboard  Full Access is granted to the Global Atom Table.  “NT AuthorityRESTRICTED” SID -> BNO Namespace squatting.  No WinSta or Desktop isolation, but compensated for with Job Object restrictions.  Read Adobe Blog posts for more information.
  • 19. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 • Session • Medium Integrity • Restricted Token • Low Integrity • Job Object Browser Tab Google Chrome (Broker) GPU Process Plug-in • Per plug-in sandboxing. Chromium
  • 20. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Chromium Practical Sandboxing Check-list OS Control Implemented?* Restricted Token - Restricted Token Yes - Privilege Stripping Yes - Low Integrity Yes Job Object Restrictions Yes Window Station Isolation Yes Desktop Isolation Yes *Renderer sandbox.
  • 21. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Chromium sandboxing  A flexible framework for applying the full “practical sandboxing” methodology  Renderer is in the most restrictive possible sandbox.  3rd Party Plug-ins are often not sandboxed  Shockwave, Java etc.  Adobe Flash has a *limited* sandbox.  GPU process is not sandboxed (planned for future release)
  • 22. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 The VUPEN Exploit (I)
  • 23. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 The VUPEN Exploit (II)
  • 24. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 The VUPEN Exploit (III)
  • 25. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 The Adobe Flash Sandbox OS Control Implemented? Restricted Token - Restricted Token Partial - Privilege Stripping No - Low Integrity No Job Object Restrictions No Window Station Isolation No Desktop Isolation No Bypass using “shatter attacks”!
  • 26. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Cheap Exploit Vectors
  • 27. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Cheap Exploit Vector #1
  • 28. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 BNO Namespace Squatting  Shared sections can be created with a name in the 'Local' namespace  Shared Sections  Mutexes, Events, Semaphores (Synchronisation objects)  By “squatting” on named object, we can set arbitrary permissions on the object if:  It can be created before the application  If the application does not fail if the named object already exists.  If we know or can predict the name of the object.  This can expose applications outside the sandbox to attacks they never knew existed…
  • 29. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 BNO Namespace Squatting – PMIE Sandbox-Escape 1) Terminate the Medium IL iexplore.exe process. 2) Predict the PID of the new process. 3) Create the “ie_lcie_main_<pid>” shared section. 4) Initialise the section with malicious data. 5) When iexplore.exe initialises LCIE, malicious code will execute outside of the sandbox.
  • 30. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 The Fuzzer that found it... int _tmain(int argc, _TCHAR* argv[]) { unsigned int size = _tstoi(argv[2]); HANDLE hSection = CreateFileMapping(NULL, NULL, PAGE_EXECUTE_READWRITE, 0, size, argv[1]); unsigned char* lpBuff = (unsigned char*) MapViewOfFile(hSection, FILE_MAP_WRITE | FILE_MAP_READ, 0, 0, size); // Take a copy of the initial contents of the section. memcpy(init, lpBuff, size); while(1) { memcpy(lpBuff, init, sizeof(init)); for(unsigned int i = 32; i < size; i++) if(rand() % 1000 < 5 ) lpBuff[i] = (unsigned char) rand(); PROCESS_INFORMATION ProcInfo1 = {0}; STARTUPINFOA StartupInfo1 = {0}; CreateProcessA(NULL, "C:Program FilesInternet Exploreriexplore.exe", NULL, NULL, FALSE, 0, NULL, NULL,&StartupInfo1, &ProcInfo1); CloseHandle(ProcInfo1.hProcess); CloseHandle(ProcInfo1.hThread); Sleep(2000); PROCESS_INFORMATION ProcInfo2 = {0}; STARTUPINFOA StartupInfo2 = {0}; CreateProcessA(NULL, "pskill iexplore.exe", NULL, NULL, FALSE, 0, NULL, NULL, &StartupInfo2, &ProcInfo2); CloseHandle(ProcInfo2.hProcess); CloseHandle(ProcInfo2.hThread); Sleep(1000); } return 0; }
  • 31. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 MSRC’s Response “As we are able to reproduce the crashes I have asked the Internet Explorer product team to address this issue in a next release of IE, which will most likely be IE10 rather than IE9 as that version is pretty much complete” … “We decided to close the case because Protected Mode IE is not presently a security boundary, thus a sandbox escaping is not considered a security vulnerability.”
  • 32. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 BNO Namespace Squatting – Other Practical Sandboxes • Exploitable from Protected Mode IE –Low Integrity only • Exploitable from Adobe Reader X –Process Token has “NT AUTHORITYRESTRICTED” –Grants access to create objects in Local BNO •Not Exploitable from Chrome Renderer sandbox –“Naked” Process Token. •But if Microsoft won’t fix this bug until IE 10? – How many more similar vulnerabilities are there? – Adobe Reader and other incomplete implementations will remain vulnerable to BNO Namespace Squatting issues.
  • 33. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Cheap Exploit #2
  • 34. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 NPAPI Interface Exploits (Chromium Specific)  NPAPI was originally used to interface between the Netscape browser and an in-process plug-in. Browser NPAPI Plug-in (DLL)NPAPI Process Browser Tab
  • 35. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Out-of-Process NPAPI  Later NPAPI crossed process boundaries  Improved stability, no improved security. Browser Tab (Process) Google Chrome (Broker Process) Trusted Plug-in (Process) NPAPI Session
  • 36. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 NPAPI In Chrome (Today) Browser Tab (Process) Google Chrome (Broker Process) Trusted Plug-in (Process) NPAPI Sandbox Session • NPAPI now crosses a security boundary between sandboxed tabs and un-sandboxed plug-ins.
  • 37. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 NPAPI Exploits  NPAPI Callers were previously trusted...  ...Now they are not.  Flash and other plug-ins are currently not securely sandboxed.  Exploitable bugs in Adobe (and other vendors) code will allow sandbox-escape.  But these bugs were previously not vulnerabilities → Implicit Calling conventions?
  • 38. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 A benign crash? • Thread 9 *CRASHED* ( EXCEPTION_ACCESS_VIOLATION @ 0x09ccf232 ) 0x102e5c06 [NPSWF32.dll - memcpy.asm:257] memcpy 0x102e1828 [NPSWF32.dll + 0x002e1828] CBitStream::Fill(unsigned char const*, int) 0x102e0b96 [NPSWF32.dll + 0x002e0b96] mp3decFill 0x102e0892 [NPSWF32.dll + 0x002e0892] PlatformMp3Decoder::Refill(int,unsigned char*) 0x10063d21 [NPSWF32.dll + 0x00063d21] CMp3Decomp::GetDecompressedData(short*,int,int,int,int) 0x10063f62 [NPSWF32.dll + 0x00063f62] CMp3Decomp::Decompress(short *,int) 0x100ad448 [NPSWF32.dll + 0x000ad448] CoreSoundMix::BuildBuffer(int) 0x100ae2c5 [NPSWF32.dll + 0x000ae2c5] CoreSoundMix::SendBuffer(int,int) 0x10153d6b [NPSWF32.dll + 0x00153d6b] PlatformSoundMix::SoundThread() 0x10154034 [NPSWF32.dll + 0x00154034] PlatformSoundMix::SoundThreadFunc(void *) 0x7c80b728 [kernel32.dll + 0x0000b728] BaseThreadStart Full report @ http://crash/reportdetail?reportid=b370c132fc6587f7 Google Chrome 4.0.249.70 (Official Build 36218)  This was found by accident (using Chromium)  Fixed by Adobe!
  • 39. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Input events  Can also send key and mouse events.  NPP_InputEvent().  Possible to bypass Flash Security Dialogs  Enable web-cam  Enable Microphone  Plug-ins are currently unable to distinguish between user input and simulated input from renderer.  Hopefully this is fixed in “Pepper”.
  • 40. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Cheap Exploit #3
  • 41. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Handle Leaks  Handles which refer to privileged resources may exist in sandboxes for several reasons.  A handle can be used for any operation for which it has already been granted access.  If the right type of handle is leaked into the sandbox, it can be used for sandbox-escape.  These handles are easily detected at run-time!
  • 42. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 What causes “Handle Leaks”?  Deliberately granted by broker.  Accidentally granted by broker.  Incorrectly granted by broker (policy error)  Unclosed handles from sandbox initialisation  Before Lock-down (init. with unrestricted token)  Internal handles kept open by libraries  Internal handles kept open by 3rd Party Hook DLLs  Libraries in use must be “sandbox friendly”
  • 43. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Adobe Reader X Handle Leaks  Sandboxed renderer has write access to the Medium-integrity Internet Explorer cookie store, history etc.  The ARX broker also doesn't currently restrict read access to local file system.
  • 44. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Cheap Exploit #4
  • 45. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Clipboard Attacks  In PMIE and AR-X, the clipboard is shared between the sandbox and the rest of the user's session.  Ever put your password in the clipboard?  What about attacking other applications?  Previously, the clipboard contents were normally trustworthy, now they are not.
  • 46. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Clipboard Attacks  What about...  Pasting malicious command lines into a shell followed by a new line?  Inputting maliciously formatted data into the clipboard?  Do application developers implicitly trust clipboard contents?
  • 47. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 A counter-argument to Adobe’s view of the sandbox
  • 48. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
  • 49. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
  • 50. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
  • 51. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
  • 52. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Conclusions
  • 53. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Conclusions  Developing sandbox escape exploits varies considerably between different implementations  Secondary (local) exploits cheaper to find and develop than the primary (remote) exploit.  Not necessarily a big disincentive for attackers.  Especially if the goal is to steal a resource available inside the sandbox!
  • 54. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Relative Security of Sandbox Implementations Google Chrome Renderer Adobe Reader X Protected Mode Internet Explorer Google Chrome Flash Plug-in Privilege Stripping No Sandbox More Protection Less Protection
  • 55. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Conclusions  Sandboxes have changed the exploitation landscape and will continue to do so  Greater emphasis on local privilege escalation  Desktop applications under greater scrutiny  New attack surfaces  When forced to attackers will start to adopt sandbox-aware malware.  Insufficient motivation to do so yet!  PMIE sandbox escapes only started getting attention when Pwn2Own made it a requirement of “own”.  There are now at least 4 un-patched PMIE escapes (source: Twitter).
  • 56. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Any Questions? Twitter: @tkeetch tom.keetch@uk.verizonbusiness.com
  • 57. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 More information • My OWASP AppSec EU Slides – http://www.owasp.org/index.php/AppSecEU2011 • My Black Hat Briefings Europe 2011 Materials – https://blackhat.com/html/bh-eu-11/bh-eu-11-archives.html#Keetch • My Protected Mode IE Whitepaper – http://www.verizonbusiness.com/resources/whitepapers/wp_escapingmicrosoftprotectedmodeinte rnetexplorer_en_xg.pdf • My Hack.LU 2010 Presentation on Protected Mode IE – http://archive.hack.lu/2010/Keetch-Escaping-from-Protected-Mode-Internet-Explorer-slides.ppt • Richard Johnson: “Adobe Reader X: A Castle Built on Sand” – http://rjohnson.uninformed.org/Presentations/A%20Castle%20Made%20of%20Sand%20- %20final.pdf • Stephen Ridley: “Escaping the Sandbox” – http://www.recon.cx/2010/slides/Escaping_The_Sandbox_Stephen_A_Ridley_2010.pdf • Skywing: “Getting out of Jail: Escaping Internet Explorer Protected Mode” – http://www.uninformed.org/?v=8&a=6&t=sumry