SlideShare une entreprise Scribd logo
1  sur  57
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Practical Sandboxing on
the Windows Platform
An assessment of the Internet Explorer, Adobe
Reader and Google Chrome sandboxes
By Tom Keetch
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
About Me
• Verizon Business
– Lead consultant for Code Review in EMEA
• Previous Presentations
– OWASP AppSec EU 2011 – Practical Sandboxing with Chromium
– CONfidence 2011 - Assessing Practical Sandboxes (Updated)
– BlackHat Europe 2011 – Assessing Practical Sandboxes
– Hack.LU 2010 - Protected Mode Internet Explorer
• Exploit mitigations are my favourite topic!
–How to make exploits prohibitively expensive to find and exploit…
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Introduction

What is Practical Sandboxing?

User-mode sandboxing methodology

Based on Windows OS facilities

Overview of 3 implementations:

Protected Mode Internet Explorer (limited)

Adobe Reader X

Chromium

This presentation is about:

Breaking out of such Sandboxes with the minimum
required effort.
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Agenda
• Sandboxes for exploit mitigation (Theory)
• Overview of Practical Sandboxing
Implementations (Background)
• Sandboxing Flaws (Practical)
• A counter-argument to Adobe’s view of their
sandbox as an exploit mitigation (Argumentative)
• Conclusions
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Sandboxes for Exploit
Mitigation
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Sandboxes for exploit mitigation

Two options for exploit mitigation:

Increase cost of exploitation (DEP, ASLR)

Decrease target value (Sandboxes)

But a second stage exploit, can usually bypass the
sandbox for finite cost...

This presentation focuses on sandbox-escape.

Please read the whitepapers for more information.

Too much to cover in just 1 hour

Come talk to me after!
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
“Return-on-Exploitation”
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Two Potential Failures
1) The cost of bypassing the exploit mitigation is
too low to deter a potential attacker.
• Trivial to bypass?
• High Target Value?
1) The reduction of value of the target is not
sufficient to deter a potential attacker.
• Protecting the wrong assets?
• Some assets cannot be protected by a sandbox.
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Looking for “cheap” exploits

This research set out to find the easiest places to
find sandbox-escape exploits.

Cheap-to-find exploit types were found:

Previously unexposed interfaces

Easily detectable (and exploitable) conditions

Mostly due to incomplete sandbox implementations…

… but also sandbox-specific issues.

Also, resources not protected by sandbox:

Network Access

Resources protected by the Same Origin Policy

Kernel Interfaces
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Overview of Practical
Sandbox Implementations
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
The Practical Sandboxing
Methodology

Restricted Access token

Deny-only SIDs (Discretionary)

Low Integrity (Mandatory)

Privilege Stripping (Capability)

GUI Sub-System Security

Window Station Isolation

Desktop Isolation

Job Object Restrictions
Each mitigates against a different attack!
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
• Session
• WinStation
• Desktop
• Medium Integrity
• Low Integrity
Browser Tab
(Internet Zone)
Browser Tab
(Trusted Zone,
Local Intranet Zone)
Internet Explorer
(Broker)
Protected Mode Internet Explorer
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Protected Mode Internet Explorer
Practical Sandboxing Check-list
OS Control Implemented?
Restricted Token
- Restricted Token No
- Privilege Stripping Yes
- Low Integrity Yes
Job Object Restrictions No
Window Station Isolation No
Desktop Isolation No
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Protected Mode Internet Explorer
Sandboxing

Sandbox Limitations:

Only supported on Vista and later, because only Integrity Levels are used.

Only protected the Integrity of the system, not confidentiality.

Full access to Windows station resources (including Clipboard, GAT).

Many possible sandbox escape routes including:

UAC Launches

Trusted Broker attacks

Generic PMIE bypass for a domain-joined workstation.

More information previously presented at Hack.LU, Oct 2010.

Not a Security Boundary, for many reasons.

Lots of potential elevation routes.
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
• Session
• Medium Integrity
• (Workstation)
• (Desktop)
• Restricted Token
• Low Integrity
• Job Object
PDF Renderer
Adobe Reader
(Broker)
Adobe Reader X
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Adobe Reader X
Practical Sandboxing Check-list
OS Control Implemented?
Restricted Token
- Restricted Token Yes
- Privilege Stripping Yes
- Low Integrity Yes
Job Object Restrictions Partial
Window Station Isolation No
Desktop Isolation No
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Adobe Reader X Sandboxing

Makes use of Chromium sandboxing and IPC
framework (BSD license)

PDF Rendering is sandboxed.

Sandbox Limitations:

The broker does not restrict read access.

Sandbox doesn't protect user’s clipboard

Full Access is granted to the Global Atom Table.

“NT AuthorityRESTRICTED” SID -> BNO Namespace squatting.

No WinSta or Desktop isolation, but compensated
for with Job Object restrictions.

Read Adobe Blog posts for more information.
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
• Session
• Medium Integrity
• Restricted Token
• Low Integrity
• Job Object
Browser Tab
Google Chrome
(Broker)
GPU
Process
Plug-in
• Per plug-in
sandboxing.
Chromium
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Chromium
Practical Sandboxing Check-list
OS Control Implemented?*
Restricted Token
- Restricted Token Yes
- Privilege Stripping Yes
- Low Integrity Yes
Job Object Restrictions Yes
Window Station Isolation Yes
Desktop Isolation Yes
*Renderer sandbox.
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Chromium sandboxing

A flexible framework for applying the full
“practical sandboxing” methodology

Renderer is in the most restrictive possible
sandbox.

3rd
Party Plug-ins are often not sandboxed

Shockwave, Java etc.

Adobe Flash has a *limited* sandbox.

GPU process is not sandboxed
(planned for future release)
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
The VUPEN Exploit (I)
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
The VUPEN Exploit (II)
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
The VUPEN Exploit (III)
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
The Adobe Flash Sandbox
OS Control Implemented?
Restricted Token
- Restricted Token Partial
- Privilege Stripping No
- Low Integrity No
Job Object Restrictions No
Window Station Isolation No
Desktop Isolation No
Bypass using “shatter attacks”!
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Cheap Exploit Vectors
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Cheap Exploit Vector #1
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
BNO Namespace Squatting

Shared sections can be created with a name in the
'Local' namespace

Shared Sections

Mutexes, Events, Semaphores (Synchronisation objects)

By “squatting” on named object, we can set
arbitrary permissions on the object if:

It can be created before the application

If the application does not fail if the named object already exists.

If we know or can predict the name of the object.

This can expose applications outside the sandbox
to attacks they never knew existed…
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
BNO Namespace Squatting –
PMIE Sandbox-Escape
1) Terminate the Medium IL iexplore.exe process.
2) Predict the PID of the new process.
3) Create the “ie_lcie_main_<pid>” shared section.
4) Initialise the section with malicious data.
5) When iexplore.exe initialises LCIE, malicious code
will execute outside of the sandbox.
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
The Fuzzer that found it...
int _tmain(int argc, _TCHAR* argv[])
{
unsigned int size = _tstoi(argv[2]);
HANDLE hSection = CreateFileMapping(NULL, NULL, PAGE_EXECUTE_READWRITE, 0, size, argv[1]);
unsigned char* lpBuff = (unsigned char*) MapViewOfFile(hSection, FILE_MAP_WRITE | FILE_MAP_READ, 0, 0, size);
// Take a copy of the initial contents of the section.
memcpy(init, lpBuff, size);
while(1)
{
memcpy(lpBuff, init, sizeof(init));
for(unsigned int i = 32; i < size; i++)
if(rand() % 1000 < 5 ) lpBuff[i] = (unsigned char) rand();
PROCESS_INFORMATION ProcInfo1 = {0};
STARTUPINFOA StartupInfo1 = {0};
CreateProcessA(NULL, "C:Program FilesInternet Exploreriexplore.exe", NULL, NULL, FALSE, 0, NULL, NULL,&StartupInfo1, &ProcInfo1);
CloseHandle(ProcInfo1.hProcess);
CloseHandle(ProcInfo1.hThread);
Sleep(2000);
PROCESS_INFORMATION ProcInfo2 = {0};
STARTUPINFOA StartupInfo2 = {0};
CreateProcessA(NULL, "pskill iexplore.exe", NULL, NULL, FALSE, 0, NULL, NULL, &StartupInfo2, &ProcInfo2);
CloseHandle(ProcInfo2.hProcess);
CloseHandle(ProcInfo2.hThread);
Sleep(1000);
}
return 0;
}
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
MSRC’s Response
“As we are able to reproduce the crashes I have
asked the Internet Explorer product team to
address this issue in a next release of IE, which
will most likely be IE10 rather than IE9 as that
version is pretty much complete”
…
“We decided to close the case because Protected
Mode IE is not presently a security boundary, thus
a sandbox escaping is not considered a security
vulnerability.”
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
BNO Namespace Squatting –
Other Practical Sandboxes
• Exploitable from Protected Mode IE
–Low Integrity only
• Exploitable from Adobe Reader X
–Process Token has “NT AUTHORITYRESTRICTED”
–Grants access to create objects in Local BNO
•Not Exploitable from Chrome Renderer sandbox
–“Naked” Process Token.
•But if Microsoft won’t fix this bug until IE 10?
– How many more similar vulnerabilities are there?
– Adobe Reader and other incomplete implementations will remain
vulnerable to BNO Namespace Squatting issues.
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Cheap Exploit #2
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
NPAPI Interface Exploits
(Chromium Specific)

NPAPI was originally used to interface between
the Netscape browser and an in-process plug-in.
Browser
NPAPI Plug-in
(DLL)NPAPI
Process
Browser Tab
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Out-of-Process NPAPI

Later NPAPI crossed process boundaries

Improved stability, no improved security.
Browser Tab
(Process)
Google Chrome
(Broker Process)
Trusted
Plug-in
(Process)
NPAPI
Session
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
NPAPI In Chrome (Today)
Browser Tab
(Process)
Google Chrome
(Broker Process)
Trusted
Plug-in
(Process)
NPAPI
Sandbox
Session
• NPAPI now crosses a security boundary between
sandboxed tabs and un-sandboxed plug-ins.
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
NPAPI Exploits

NPAPI Callers were previously trusted...

...Now they are not.

Flash and other plug-ins are currently not
securely sandboxed.

Exploitable bugs in Adobe (and other vendors)
code will allow sandbox-escape.

But these bugs were previously not vulnerabilities
→ Implicit Calling conventions?
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
A benign crash?
• Thread 9 *CRASHED* ( EXCEPTION_ACCESS_VIOLATION @ 0x09ccf232 )
0x102e5c06 [NPSWF32.dll - memcpy.asm:257] memcpy
0x102e1828 [NPSWF32.dll + 0x002e1828] CBitStream::Fill(unsigned char const*, int)
0x102e0b96 [NPSWF32.dll + 0x002e0b96] mp3decFill
0x102e0892 [NPSWF32.dll + 0x002e0892] PlatformMp3Decoder::Refill(int,unsigned char*)
0x10063d21 [NPSWF32.dll + 0x00063d21] CMp3Decomp::GetDecompressedData(short*,int,int,int,int)
0x10063f62 [NPSWF32.dll + 0x00063f62] CMp3Decomp::Decompress(short *,int)
0x100ad448 [NPSWF32.dll + 0x000ad448] CoreSoundMix::BuildBuffer(int)
0x100ae2c5 [NPSWF32.dll + 0x000ae2c5] CoreSoundMix::SendBuffer(int,int)
0x10153d6b [NPSWF32.dll + 0x00153d6b] PlatformSoundMix::SoundThread()
0x10154034 [NPSWF32.dll + 0x00154034] PlatformSoundMix::SoundThreadFunc(void *)
0x7c80b728 [kernel32.dll + 0x0000b728] BaseThreadStart
Full report @ http://crash/reportdetail?reportid=b370c132fc6587f7
Google Chrome 4.0.249.70 (Official Build 36218)

This was found by accident (using Chromium)

Fixed by Adobe!
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Input events

Can also send key and mouse events.

NPP_InputEvent().

Possible to bypass Flash Security Dialogs

Enable web-cam

Enable Microphone

Plug-ins are currently unable to distinguish
between user input and simulated input from
renderer.

Hopefully this is fixed in “Pepper”.
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Cheap Exploit #3
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Handle Leaks

Handles which refer to privileged resources may
exist in sandboxes for several reasons.

A handle can be used for any operation for which it
has already been granted access.

If the right type of handle is leaked into the
sandbox, it can be used for sandbox-escape.

These handles are easily detected at run-time!
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
What causes “Handle Leaks”?

Deliberately granted by broker.

Accidentally granted by broker.

Incorrectly granted by broker (policy error)

Unclosed handles from sandbox initialisation

Before Lock-down (init. with unrestricted token)

Internal handles kept open by libraries

Internal handles kept open by 3rd
Party Hook DLLs

Libraries in use must be “sandbox friendly”
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Adobe Reader X Handle Leaks

Sandboxed renderer has write access to the
Medium-integrity Internet Explorer cookie store,
history etc.

The ARX broker also doesn't currently restrict read
access to local file system.
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Cheap Exploit #4
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Clipboard Attacks

In PMIE and AR-X, the clipboard is shared between
the sandbox and the rest of the user's session.

Ever put your password in the clipboard?

What about attacking other applications?

Previously, the clipboard contents were normally
trustworthy, now they are not.
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Clipboard Attacks

What about...

Pasting malicious command lines into a shell followed
by a new line?

Inputting maliciously formatted data into the
clipboard?

Do application developers implicitly trust clipboard
contents?
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
A counter-argument to Adobe’s
view of the sandbox
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Conclusions
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Conclusions

Developing sandbox escape exploits varies
considerably between different implementations

Secondary (local) exploits cheaper to find and
develop than the primary (remote) exploit.

Not necessarily a big disincentive for attackers.

Especially if the goal is to steal a resource
available inside the sandbox!
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Relative Security of Sandbox Implementations
Google Chrome Renderer
Adobe Reader X
Protected Mode Internet Explorer
Google Chrome Flash Plug-in
Privilege Stripping
No Sandbox
More Protection
Less Protection
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Conclusions

Sandboxes have changed the exploitation
landscape and will continue to do so

Greater emphasis on local privilege escalation

Desktop applications under greater scrutiny

New attack surfaces

When forced to attackers will start to adopt
sandbox-aware malware.

Insufficient motivation to do so yet!

PMIE sandbox escapes only started getting attention
when Pwn2Own made it a requirement of “own”.

There are now at least 4 un-patched PMIE escapes
(source: Twitter).
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
Any Questions?
Twitter: @tkeetch
tom.keetch@uk.verizonbusiness.com
© 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
More information
• My OWASP AppSec EU Slides
– http://www.owasp.org/index.php/AppSecEU2011
• My Black Hat Briefings Europe 2011 Materials
– https://blackhat.com/html/bh-eu-11/bh-eu-11-archives.html#Keetch
• My Protected Mode IE Whitepaper
– http://www.verizonbusiness.com/resources/whitepapers/wp_escapingmicrosoftprotectedmodeinte
rnetexplorer_en_xg.pdf
• My Hack.LU 2010 Presentation on Protected Mode IE
– http://archive.hack.lu/2010/Keetch-Escaping-from-Protected-Mode-Internet-Explorer-slides.ppt
• Richard Johnson: “Adobe Reader X: A Castle Built on Sand”
– http://rjohnson.uninformed.org/Presentations/A%20Castle%20Made%20of%20Sand%20-
%20final.pdf
• Stephen Ridley: “Escaping the Sandbox”
– http://www.recon.cx/2010/slides/Escaping_The_Sandbox_Stephen_A_Ridley_2010.pdf
• Skywing: “Getting out of Jail: Escaping Internet Explorer Protected Mode”
– http://www.uninformed.org/?v=8&a=6&t=sumry

Contenu connexe

Tendances

NCC Group 44Con Workshop: How to assess and secure ios apps
NCC Group 44Con Workshop: How to assess and secure ios appsNCC Group 44Con Workshop: How to assess and secure ios apps
NCC Group 44Con Workshop: How to assess and secure ios appsNCC Group
 
Windows Operating System Archaeology
Windows Operating System ArchaeologyWindows Operating System Archaeology
Windows Operating System Archaeologyenigma0x3
 
Defcon 22-david-wyde-client-side-http-cookie-security
Defcon 22-david-wyde-client-side-http-cookie-securityDefcon 22-david-wyde-client-side-http-cookie-security
Defcon 22-david-wyde-client-side-http-cookie-securityPriyanka Aash
 
UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...
UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...
UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...Vincent Giersch
 
CSW2017 Geshev+Miller logic bug hunting in chrome on android
CSW2017 Geshev+Miller logic bug hunting in chrome on androidCSW2017 Geshev+Miller logic bug hunting in chrome on android
CSW2017 Geshev+Miller logic bug hunting in chrome on androidCanSecWest
 
Poc2015 os x_kernel_is_as_strong_as_its_weakest_part_liang_shuaitian
Poc2015 os x_kernel_is_as_strong_as_its_weakest_part_liang_shuaitianPoc2015 os x_kernel_is_as_strong_as_its_weakest_part_liang_shuaitian
Poc2015 os x_kernel_is_as_strong_as_its_weakest_part_liang_shuaitianLiang Chen
 
Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nak...
Revealing the Attack Operations Targeting Japan by  Shusei Tomonaga & Yuu Nak...Revealing the Attack Operations Targeting Japan by  Shusei Tomonaga & Yuu Nak...
Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nak...CODE BLUE
 
The Dark Side of PowerShell by George Dobrea
The Dark Side of PowerShell by George DobreaThe Dark Side of PowerShell by George Dobrea
The Dark Side of PowerShell by George DobreaEC-Council
 
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)BlueHat Security Conference
 
Горизонтальные перемещения в инфраструктуре Windows
Горизонтальные перемещения в инфраструктуре WindowsГоризонтальные перемещения в инфраструктуре Windows
Горизонтальные перемещения в инфраструктуре WindowsPositive Hack Days
 
CSW2017Richard Johnson_harnessing intel processor trace on windows for vulner...
CSW2017Richard Johnson_harnessing intel processor trace on windows for vulner...CSW2017Richard Johnson_harnessing intel processor trace on windows for vulner...
CSW2017Richard Johnson_harnessing intel processor trace on windows for vulner...CanSecWest
 
CNIT 126 Ch 11: Malware Behavior
CNIT 126 Ch 11: Malware BehaviorCNIT 126 Ch 11: Malware Behavior
CNIT 126 Ch 11: Malware BehaviorSam Bowne
 
BlueHat v17 || Dangerous Contents - Securing .Net Deserialization
BlueHat v17 || Dangerous Contents - Securing .Net Deserialization BlueHat v17 || Dangerous Contents - Securing .Net Deserialization
BlueHat v17 || Dangerous Contents - Securing .Net Deserialization BlueHat Security Conference
 
Andy Davis' Black Hat USA Presentation Revealing embedded fingerprints
Andy Davis' Black Hat USA Presentation Revealing embedded fingerprintsAndy Davis' Black Hat USA Presentation Revealing embedded fingerprints
Andy Davis' Black Hat USA Presentation Revealing embedded fingerprintsNCC Group
 
Oracle Database 12c Attack Vectors
Oracle Database 12c Attack VectorsOracle Database 12c Attack Vectors
Oracle Database 12c Attack VectorsMartin Toshev
 
CNIT 128 9. Writing Secure Android Applications
CNIT 128 9. Writing Secure Android ApplicationsCNIT 128 9. Writing Secure Android Applications
CNIT 128 9. Writing Secure Android ApplicationsSam Bowne
 
Kochetova+osipv atm how_to_make_the_fraud__final
Kochetova+osipv atm how_to_make_the_fraud__finalKochetova+osipv atm how_to_make_the_fraud__final
Kochetova+osipv atm how_to_make_the_fraud__finalPacSecJP
 
Заполучили права администратора домена? Игра еще не окончена
Заполучили права администратора домена? Игра еще не оконченаЗаполучили права администратора домена? Игра еще не окончена
Заполучили права администратора домена? Игра еще не оконченаPositive Hack Days
 
Kasza smashing the_jars
Kasza smashing the_jarsKasza smashing the_jars
Kasza smashing the_jarsPacSecJP
 

Tendances (20)

NCC Group 44Con Workshop: How to assess and secure ios apps
NCC Group 44Con Workshop: How to assess and secure ios appsNCC Group 44Con Workshop: How to assess and secure ios apps
NCC Group 44Con Workshop: How to assess and secure ios apps
 
Windows Operating System Archaeology
Windows Operating System ArchaeologyWindows Operating System Archaeology
Windows Operating System Archaeology
 
Defcon 22-david-wyde-client-side-http-cookie-security
Defcon 22-david-wyde-client-side-http-cookie-securityDefcon 22-david-wyde-client-side-http-cookie-security
Defcon 22-david-wyde-client-side-http-cookie-security
 
UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...
UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...
UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...
 
CSW2017 Geshev+Miller logic bug hunting in chrome on android
CSW2017 Geshev+Miller logic bug hunting in chrome on androidCSW2017 Geshev+Miller logic bug hunting in chrome on android
CSW2017 Geshev+Miller logic bug hunting in chrome on android
 
Poc2015 os x_kernel_is_as_strong_as_its_weakest_part_liang_shuaitian
Poc2015 os x_kernel_is_as_strong_as_its_weakest_part_liang_shuaitianPoc2015 os x_kernel_is_as_strong_as_its_weakest_part_liang_shuaitian
Poc2015 os x_kernel_is_as_strong_as_its_weakest_part_liang_shuaitian
 
Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nak...
Revealing the Attack Operations Targeting Japan by  Shusei Tomonaga & Yuu Nak...Revealing the Attack Operations Targeting Japan by  Shusei Tomonaga & Yuu Nak...
Revealing the Attack Operations Targeting Japan by Shusei Tomonaga & Yuu Nak...
 
The Dark Side of PowerShell by George Dobrea
The Dark Side of PowerShell by George DobreaThe Dark Side of PowerShell by George Dobrea
The Dark Side of PowerShell by George Dobrea
 
Html5 hacking
Html5 hackingHtml5 hacking
Html5 hacking
 
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
 
Горизонтальные перемещения в инфраструктуре Windows
Горизонтальные перемещения в инфраструктуре WindowsГоризонтальные перемещения в инфраструктуре Windows
Горизонтальные перемещения в инфраструктуре Windows
 
CSW2017Richard Johnson_harnessing intel processor trace on windows for vulner...
CSW2017Richard Johnson_harnessing intel processor trace on windows for vulner...CSW2017Richard Johnson_harnessing intel processor trace on windows for vulner...
CSW2017Richard Johnson_harnessing intel processor trace on windows for vulner...
 
CNIT 126 Ch 11: Malware Behavior
CNIT 126 Ch 11: Malware BehaviorCNIT 126 Ch 11: Malware Behavior
CNIT 126 Ch 11: Malware Behavior
 
BlueHat v17 || Dangerous Contents - Securing .Net Deserialization
BlueHat v17 || Dangerous Contents - Securing .Net Deserialization BlueHat v17 || Dangerous Contents - Securing .Net Deserialization
BlueHat v17 || Dangerous Contents - Securing .Net Deserialization
 
Andy Davis' Black Hat USA Presentation Revealing embedded fingerprints
Andy Davis' Black Hat USA Presentation Revealing embedded fingerprintsAndy Davis' Black Hat USA Presentation Revealing embedded fingerprints
Andy Davis' Black Hat USA Presentation Revealing embedded fingerprints
 
Oracle Database 12c Attack Vectors
Oracle Database 12c Attack VectorsOracle Database 12c Attack Vectors
Oracle Database 12c Attack Vectors
 
CNIT 128 9. Writing Secure Android Applications
CNIT 128 9. Writing Secure Android ApplicationsCNIT 128 9. Writing Secure Android Applications
CNIT 128 9. Writing Secure Android Applications
 
Kochetova+osipv atm how_to_make_the_fraud__final
Kochetova+osipv atm how_to_make_the_fraud__finalKochetova+osipv atm how_to_make_the_fraud__final
Kochetova+osipv atm how_to_make_the_fraud__final
 
Заполучили права администратора домена? Игра еще не окончена
Заполучили права администратора домена? Игра еще не оконченаЗаполучили права администратора домена? Игра еще не окончена
Заполучили права администратора домена? Игра еще не окончена
 
Kasza smashing the_jars
Kasza smashing the_jarsKasza smashing the_jars
Kasza smashing the_jars
 

En vedette

Secure and Simple Sandboxing in SELinux
Secure and Simple Sandboxing in SELinuxSecure and Simple Sandboxing in SELinux
Secure and Simple Sandboxing in SELinuxJames Morris
 
File Transfer protocols
File Transfer protocolsFile Transfer protocols
File Transfer protocolsAayushi Pareek
 
Nmap(network mapping)
Nmap(network mapping)Nmap(network mapping)
Nmap(network mapping)SSASIT
 
Content Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat ProtectionContent Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat ProtectionBlue Coat
 
Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101Blue Coat
 
File transfer protocol
File transfer protocolFile transfer protocol
File transfer protocolMilind Swane
 
Sandbox vs manual malware analysis v1.1
Sandbox vs manual malware analysis v1.1Sandbox vs manual malware analysis v1.1
Sandbox vs manual malware analysis v1.1Michael Gough
 
Remote network monitoring
Remote network monitoringRemote network monitoring
Remote network monitoringyousef emami
 
Nmap not only a port scanner by ravi rajput comexpo security awareness meet
Nmap not only a port scanner by ravi rajput comexpo security awareness meet Nmap not only a port scanner by ravi rajput comexpo security awareness meet
Nmap not only a port scanner by ravi rajput comexpo security awareness meet Ravi Rajput
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionBharat Thakkar
 
Network scanning
Network scanningNetwork scanning
Network scanningoceanofwebs
 
Hacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning TechniquesHacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning Techniquesamiable_indian
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An IntroductionJayaseelan Vejayon
 

En vedette (20)

Secure and Simple Sandboxing in SELinux
Secure and Simple Sandboxing in SELinuxSecure and Simple Sandboxing in SELinux
Secure and Simple Sandboxing in SELinux
 
Sandboxing in .NET CLR
Sandboxing in .NET CLRSandboxing in .NET CLR
Sandboxing in .NET CLR
 
File Transfer protocols
File Transfer protocolsFile Transfer protocols
File Transfer protocols
 
Ceh v5 module 07 sniffers
Ceh v5 module 07 sniffersCeh v5 module 07 sniffers
Ceh v5 module 07 sniffers
 
Nmap(network mapping)
Nmap(network mapping)Nmap(network mapping)
Nmap(network mapping)
 
Content Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat ProtectionContent Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat Protection
 
Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101
 
File transfer protocol
File transfer protocolFile transfer protocol
File transfer protocol
 
Sandbox vs manual malware analysis v1.1
Sandbox vs manual malware analysis v1.1Sandbox vs manual malware analysis v1.1
Sandbox vs manual malware analysis v1.1
 
Remote network monitoring
Remote network monitoringRemote network monitoring
Remote network monitoring
 
Nmap not only a port scanner by ravi rajput comexpo security awareness meet
Nmap not only a port scanner by ravi rajput comexpo security awareness meet Nmap not only a port scanner by ravi rajput comexpo security awareness meet
Nmap not only a port scanner by ravi rajput comexpo security awareness meet
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Introduction to SNMP
Introduction to SNMPIntroduction to SNMP
Introduction to SNMP
 
Network scanning
Network scanningNetwork scanning
Network scanning
 
Understanding NMAP
Understanding NMAPUnderstanding NMAP
Understanding NMAP
 
Port Scanning
Port ScanningPort Scanning
Port Scanning
 
Nmap Basics
Nmap BasicsNmap Basics
Nmap Basics
 
Hacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning TechniquesHacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning Techniques
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
ETHICAL HACKING PPT
ETHICAL HACKING PPTETHICAL HACKING PPT
ETHICAL HACKING PPT
 

Similaire à Hack In Paris 2011 - Practical Sandboxing

Blackhat EU 2011 - Practical Sandboxing
Blackhat EU 2011 - Practical SandboxingBlackhat EU 2011 - Practical Sandboxing
Blackhat EU 2011 - Practical SandboxingTom Keetch
 
Derbycon Bromium Labs: Sandboxes
Derbycon Bromium Labs: SandboxesDerbycon Bromium Labs: Sandboxes
Derbycon Bromium Labs: SandboxesBromium Labs
 
CONFidence 2015: Nietypowe problemy bezpieczeństwa w aplikacjach webowych - M...
CONFidence 2015: Nietypowe problemy bezpieczeństwa w aplikacjach webowych - M...CONFidence 2015: Nietypowe problemy bezpieczeństwa w aplikacjach webowych - M...
CONFidence 2015: Nietypowe problemy bezpieczeństwa w aplikacjach webowych - M...PROIDEA
 
Learning, Analyzing and Protecting Android with TOMOYO Linux (JLS2009)
Learning, Analyzing and Protecting Android with TOMOYO Linux (JLS2009)Learning, Analyzing and Protecting Android with TOMOYO Linux (JLS2009)
Learning, Analyzing and Protecting Android with TOMOYO Linux (JLS2009)Toshiharu Harada, Ph.D
 
Cooking security sans@night
Cooking security sans@nightCooking security sans@night
Cooking security sans@nightjtimberman
 
stackconf 2022: It’s Time to Debloat the Cloud with Unikraft
stackconf 2022: It’s Time to Debloat the Cloud with Unikraftstackconf 2022: It’s Time to Debloat the Cloud with Unikraft
stackconf 2022: It’s Time to Debloat the Cloud with UnikraftNETWAYS
 
Automated Malware Analysis and Cyber Security Intelligence
Automated Malware Analysis and Cyber Security IntelligenceAutomated Malware Analysis and Cyber Security Intelligence
Automated Malware Analysis and Cyber Security IntelligenceJason Choi
 
Flash security past_present_future_final_en
Flash security past_present_future_final_enFlash security past_present_future_final_en
Flash security past_present_future_final_enSunghun Kim
 
Window Shopping Browser - Bug Hunting in 2012
Window Shopping Browser - Bug Hunting in 2012Window Shopping Browser - Bug Hunting in 2012
Window Shopping Browser - Bug Hunting in 2012Roberto Suggi Liverani
 
BlueHat v17 || Out of the Truman Show: VM Escape in VMware Gracefully
BlueHat v17 || Out of the Truman Show: VM Escape in VMware Gracefully BlueHat v17 || Out of the Truman Show: VM Escape in VMware Gracefully
BlueHat v17 || Out of the Truman Show: VM Escape in VMware Gracefully BlueHat Security Conference
 
Breaking Extreme Networks WingOS: How to own millions of devices running on A...
Breaking Extreme Networks WingOS: How to own millions of devices running on A...Breaking Extreme Networks WingOS: How to own millions of devices running on A...
Breaking Extreme Networks WingOS: How to own millions of devices running on A...Priyanka Aash
 
" Breaking Extreme Networks WingOS: How to own millions of devices running on...
" Breaking Extreme Networks WingOS: How to own millions of devices running on..." Breaking Extreme Networks WingOS: How to own millions of devices running on...
" Breaking Extreme Networks WingOS: How to own millions of devices running on...PROIDEA
 
Quick and Easy Device Drivers for Embedded Linux Using UIO
Quick and Easy Device Drivers for Embedded Linux Using UIOQuick and Easy Device Drivers for Embedded Linux Using UIO
Quick and Easy Device Drivers for Embedded Linux Using UIOChris Simmonds
 
Stage 1 Tradecraft
Stage 1 TradecraftStage 1 Tradecraft
Stage 1 Tradecraftmatt806068
 
Hack.lu 09 ip-morph
Hack.lu 09 ip-morphHack.lu 09 ip-morph
Hack.lu 09 ip-morphSteph Cliche
 
US-13-Singh-Hot-Knives-Through-Butter-Evading-File-Based-Sandboxes-Slides
US-13-Singh-Hot-Knives-Through-Butter-Evading-File-Based-Sandboxes-SlidesUS-13-Singh-Hot-Knives-Through-Butter-Evading-File-Based-Sandboxes-Slides
US-13-Singh-Hot-Knives-Through-Butter-Evading-File-Based-Sandboxes-SlidesAbhishek Singh
 
NTT Docomo's Challenge looking ahead the world pf 5G × OpenStack - OpenStack最...
NTT Docomo's Challenge looking ahead the world pf 5G × OpenStack - OpenStack最...NTT Docomo's Challenge looking ahead the world pf 5G × OpenStack - OpenStack最...
NTT Docomo's Challenge looking ahead the world pf 5G × OpenStack - OpenStack最...VirtualTech Japan Inc.
 

Similaire à Hack In Paris 2011 - Practical Sandboxing (20)

Blackhat EU 2011 - Practical Sandboxing
Blackhat EU 2011 - Practical SandboxingBlackhat EU 2011 - Practical Sandboxing
Blackhat EU 2011 - Practical Sandboxing
 
Derbycon Bromium Labs: Sandboxes
Derbycon Bromium Labs: SandboxesDerbycon Bromium Labs: Sandboxes
Derbycon Bromium Labs: Sandboxes
 
CONFidence 2015: Nietypowe problemy bezpieczeństwa w aplikacjach webowych - M...
CONFidence 2015: Nietypowe problemy bezpieczeństwa w aplikacjach webowych - M...CONFidence 2015: Nietypowe problemy bezpieczeństwa w aplikacjach webowych - M...
CONFidence 2015: Nietypowe problemy bezpieczeństwa w aplikacjach webowych - M...
 
Learning, Analyzing and Protecting Android with TOMOYO Linux (JLS2009)
Learning, Analyzing and Protecting Android with TOMOYO Linux (JLS2009)Learning, Analyzing and Protecting Android with TOMOYO Linux (JLS2009)
Learning, Analyzing and Protecting Android with TOMOYO Linux (JLS2009)
 
Cooking security sans@night
Cooking security sans@nightCooking security sans@night
Cooking security sans@night
 
Sjug aug 2010_cloud
Sjug aug 2010_cloudSjug aug 2010_cloud
Sjug aug 2010_cloud
 
stackconf 2022: It’s Time to Debloat the Cloud with Unikraft
stackconf 2022: It’s Time to Debloat the Cloud with Unikraftstackconf 2022: It’s Time to Debloat the Cloud with Unikraft
stackconf 2022: It’s Time to Debloat the Cloud with Unikraft
 
Deep inside TOMOYO Linux
Deep inside TOMOYO LinuxDeep inside TOMOYO Linux
Deep inside TOMOYO Linux
 
Automated Malware Analysis and Cyber Security Intelligence
Automated Malware Analysis and Cyber Security IntelligenceAutomated Malware Analysis and Cyber Security Intelligence
Automated Malware Analysis and Cyber Security Intelligence
 
Flash security past_present_future_final_en
Flash security past_present_future_final_enFlash security past_present_future_final_en
Flash security past_present_future_final_en
 
Window Shopping Browser - Bug Hunting in 2012
Window Shopping Browser - Bug Hunting in 2012Window Shopping Browser - Bug Hunting in 2012
Window Shopping Browser - Bug Hunting in 2012
 
Zerovm backgroud
Zerovm backgroudZerovm backgroud
Zerovm backgroud
 
BlueHat v17 || Out of the Truman Show: VM Escape in VMware Gracefully
BlueHat v17 || Out of the Truman Show: VM Escape in VMware Gracefully BlueHat v17 || Out of the Truman Show: VM Escape in VMware Gracefully
BlueHat v17 || Out of the Truman Show: VM Escape in VMware Gracefully
 
Breaking Extreme Networks WingOS: How to own millions of devices running on A...
Breaking Extreme Networks WingOS: How to own millions of devices running on A...Breaking Extreme Networks WingOS: How to own millions of devices running on A...
Breaking Extreme Networks WingOS: How to own millions of devices running on A...
 
" Breaking Extreme Networks WingOS: How to own millions of devices running on...
" Breaking Extreme Networks WingOS: How to own millions of devices running on..." Breaking Extreme Networks WingOS: How to own millions of devices running on...
" Breaking Extreme Networks WingOS: How to own millions of devices running on...
 
Quick and Easy Device Drivers for Embedded Linux Using UIO
Quick and Easy Device Drivers for Embedded Linux Using UIOQuick and Easy Device Drivers for Embedded Linux Using UIO
Quick and Easy Device Drivers for Embedded Linux Using UIO
 
Stage 1 Tradecraft
Stage 1 TradecraftStage 1 Tradecraft
Stage 1 Tradecraft
 
Hack.lu 09 ip-morph
Hack.lu 09 ip-morphHack.lu 09 ip-morph
Hack.lu 09 ip-morph
 
US-13-Singh-Hot-Knives-Through-Butter-Evading-File-Based-Sandboxes-Slides
US-13-Singh-Hot-Knives-Through-Butter-Evading-File-Based-Sandboxes-SlidesUS-13-Singh-Hot-Knives-Through-Butter-Evading-File-Based-Sandboxes-Slides
US-13-Singh-Hot-Knives-Through-Butter-Evading-File-Based-Sandboxes-Slides
 
NTT Docomo's Challenge looking ahead the world pf 5G × OpenStack - OpenStack最...
NTT Docomo's Challenge looking ahead the world pf 5G × OpenStack - OpenStack最...NTT Docomo's Challenge looking ahead the world pf 5G × OpenStack - OpenStack最...
NTT Docomo's Challenge looking ahead the world pf 5G × OpenStack - OpenStack最...
 

Dernier

Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Intelisync
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 

Dernier (20)

Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 

Hack In Paris 2011 - Practical Sandboxing

  • 1. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Practical Sandboxing on the Windows Platform An assessment of the Internet Explorer, Adobe Reader and Google Chrome sandboxes By Tom Keetch
  • 2. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 About Me • Verizon Business – Lead consultant for Code Review in EMEA • Previous Presentations – OWASP AppSec EU 2011 – Practical Sandboxing with Chromium – CONfidence 2011 - Assessing Practical Sandboxes (Updated) – BlackHat Europe 2011 – Assessing Practical Sandboxes – Hack.LU 2010 - Protected Mode Internet Explorer • Exploit mitigations are my favourite topic! –How to make exploits prohibitively expensive to find and exploit…
  • 3. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Introduction  What is Practical Sandboxing?  User-mode sandboxing methodology  Based on Windows OS facilities  Overview of 3 implementations:  Protected Mode Internet Explorer (limited)  Adobe Reader X  Chromium  This presentation is about:  Breaking out of such Sandboxes with the minimum required effort.
  • 4. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Agenda • Sandboxes for exploit mitigation (Theory) • Overview of Practical Sandboxing Implementations (Background) • Sandboxing Flaws (Practical) • A counter-argument to Adobe’s view of their sandbox as an exploit mitigation (Argumentative) • Conclusions
  • 5. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Sandboxes for Exploit Mitigation
  • 6. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Sandboxes for exploit mitigation  Two options for exploit mitigation:  Increase cost of exploitation (DEP, ASLR)  Decrease target value (Sandboxes)  But a second stage exploit, can usually bypass the sandbox for finite cost...  This presentation focuses on sandbox-escape.  Please read the whitepapers for more information.  Too much to cover in just 1 hour  Come talk to me after!
  • 7. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 “Return-on-Exploitation”
  • 8. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Two Potential Failures 1) The cost of bypassing the exploit mitigation is too low to deter a potential attacker. • Trivial to bypass? • High Target Value? 1) The reduction of value of the target is not sufficient to deter a potential attacker. • Protecting the wrong assets? • Some assets cannot be protected by a sandbox.
  • 9. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
  • 10. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Looking for “cheap” exploits  This research set out to find the easiest places to find sandbox-escape exploits.  Cheap-to-find exploit types were found:  Previously unexposed interfaces  Easily detectable (and exploitable) conditions  Mostly due to incomplete sandbox implementations…  … but also sandbox-specific issues.  Also, resources not protected by sandbox:  Network Access  Resources protected by the Same Origin Policy  Kernel Interfaces
  • 11. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Overview of Practical Sandbox Implementations
  • 12. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 The Practical Sandboxing Methodology  Restricted Access token  Deny-only SIDs (Discretionary)  Low Integrity (Mandatory)  Privilege Stripping (Capability)  GUI Sub-System Security  Window Station Isolation  Desktop Isolation  Job Object Restrictions Each mitigates against a different attack!
  • 13. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 • Session • WinStation • Desktop • Medium Integrity • Low Integrity Browser Tab (Internet Zone) Browser Tab (Trusted Zone, Local Intranet Zone) Internet Explorer (Broker) Protected Mode Internet Explorer
  • 14. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Protected Mode Internet Explorer Practical Sandboxing Check-list OS Control Implemented? Restricted Token - Restricted Token No - Privilege Stripping Yes - Low Integrity Yes Job Object Restrictions No Window Station Isolation No Desktop Isolation No
  • 15. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Protected Mode Internet Explorer Sandboxing  Sandbox Limitations:  Only supported on Vista and later, because only Integrity Levels are used.  Only protected the Integrity of the system, not confidentiality.  Full access to Windows station resources (including Clipboard, GAT).  Many possible sandbox escape routes including:  UAC Launches  Trusted Broker attacks  Generic PMIE bypass for a domain-joined workstation.  More information previously presented at Hack.LU, Oct 2010.  Not a Security Boundary, for many reasons.  Lots of potential elevation routes.
  • 16. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 • Session • Medium Integrity • (Workstation) • (Desktop) • Restricted Token • Low Integrity • Job Object PDF Renderer Adobe Reader (Broker) Adobe Reader X
  • 17. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Adobe Reader X Practical Sandboxing Check-list OS Control Implemented? Restricted Token - Restricted Token Yes - Privilege Stripping Yes - Low Integrity Yes Job Object Restrictions Partial Window Station Isolation No Desktop Isolation No
  • 18. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Adobe Reader X Sandboxing  Makes use of Chromium sandboxing and IPC framework (BSD license)  PDF Rendering is sandboxed.  Sandbox Limitations:  The broker does not restrict read access.  Sandbox doesn't protect user’s clipboard  Full Access is granted to the Global Atom Table.  “NT AuthorityRESTRICTED” SID -> BNO Namespace squatting.  No WinSta or Desktop isolation, but compensated for with Job Object restrictions.  Read Adobe Blog posts for more information.
  • 19. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 • Session • Medium Integrity • Restricted Token • Low Integrity • Job Object Browser Tab Google Chrome (Broker) GPU Process Plug-in • Per plug-in sandboxing. Chromium
  • 20. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Chromium Practical Sandboxing Check-list OS Control Implemented?* Restricted Token - Restricted Token Yes - Privilege Stripping Yes - Low Integrity Yes Job Object Restrictions Yes Window Station Isolation Yes Desktop Isolation Yes *Renderer sandbox.
  • 21. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Chromium sandboxing  A flexible framework for applying the full “practical sandboxing” methodology  Renderer is in the most restrictive possible sandbox.  3rd Party Plug-ins are often not sandboxed  Shockwave, Java etc.  Adobe Flash has a *limited* sandbox.  GPU process is not sandboxed (planned for future release)
  • 22. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 The VUPEN Exploit (I)
  • 23. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 The VUPEN Exploit (II)
  • 24. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 The VUPEN Exploit (III)
  • 25. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 The Adobe Flash Sandbox OS Control Implemented? Restricted Token - Restricted Token Partial - Privilege Stripping No - Low Integrity No Job Object Restrictions No Window Station Isolation No Desktop Isolation No Bypass using “shatter attacks”!
  • 26. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Cheap Exploit Vectors
  • 27. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Cheap Exploit Vector #1
  • 28. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 BNO Namespace Squatting  Shared sections can be created with a name in the 'Local' namespace  Shared Sections  Mutexes, Events, Semaphores (Synchronisation objects)  By “squatting” on named object, we can set arbitrary permissions on the object if:  It can be created before the application  If the application does not fail if the named object already exists.  If we know or can predict the name of the object.  This can expose applications outside the sandbox to attacks they never knew existed…
  • 29. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 BNO Namespace Squatting – PMIE Sandbox-Escape 1) Terminate the Medium IL iexplore.exe process. 2) Predict the PID of the new process. 3) Create the “ie_lcie_main_<pid>” shared section. 4) Initialise the section with malicious data. 5) When iexplore.exe initialises LCIE, malicious code will execute outside of the sandbox.
  • 30. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 The Fuzzer that found it... int _tmain(int argc, _TCHAR* argv[]) { unsigned int size = _tstoi(argv[2]); HANDLE hSection = CreateFileMapping(NULL, NULL, PAGE_EXECUTE_READWRITE, 0, size, argv[1]); unsigned char* lpBuff = (unsigned char*) MapViewOfFile(hSection, FILE_MAP_WRITE | FILE_MAP_READ, 0, 0, size); // Take a copy of the initial contents of the section. memcpy(init, lpBuff, size); while(1) { memcpy(lpBuff, init, sizeof(init)); for(unsigned int i = 32; i < size; i++) if(rand() % 1000 < 5 ) lpBuff[i] = (unsigned char) rand(); PROCESS_INFORMATION ProcInfo1 = {0}; STARTUPINFOA StartupInfo1 = {0}; CreateProcessA(NULL, "C:Program FilesInternet Exploreriexplore.exe", NULL, NULL, FALSE, 0, NULL, NULL,&StartupInfo1, &ProcInfo1); CloseHandle(ProcInfo1.hProcess); CloseHandle(ProcInfo1.hThread); Sleep(2000); PROCESS_INFORMATION ProcInfo2 = {0}; STARTUPINFOA StartupInfo2 = {0}; CreateProcessA(NULL, "pskill iexplore.exe", NULL, NULL, FALSE, 0, NULL, NULL, &StartupInfo2, &ProcInfo2); CloseHandle(ProcInfo2.hProcess); CloseHandle(ProcInfo2.hThread); Sleep(1000); } return 0; }
  • 31. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 MSRC’s Response “As we are able to reproduce the crashes I have asked the Internet Explorer product team to address this issue in a next release of IE, which will most likely be IE10 rather than IE9 as that version is pretty much complete” … “We decided to close the case because Protected Mode IE is not presently a security boundary, thus a sandbox escaping is not considered a security vulnerability.”
  • 32. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 BNO Namespace Squatting – Other Practical Sandboxes • Exploitable from Protected Mode IE –Low Integrity only • Exploitable from Adobe Reader X –Process Token has “NT AUTHORITYRESTRICTED” –Grants access to create objects in Local BNO •Not Exploitable from Chrome Renderer sandbox –“Naked” Process Token. •But if Microsoft won’t fix this bug until IE 10? – How many more similar vulnerabilities are there? – Adobe Reader and other incomplete implementations will remain vulnerable to BNO Namespace Squatting issues.
  • 33. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Cheap Exploit #2
  • 34. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 NPAPI Interface Exploits (Chromium Specific)  NPAPI was originally used to interface between the Netscape browser and an in-process plug-in. Browser NPAPI Plug-in (DLL)NPAPI Process Browser Tab
  • 35. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Out-of-Process NPAPI  Later NPAPI crossed process boundaries  Improved stability, no improved security. Browser Tab (Process) Google Chrome (Broker Process) Trusted Plug-in (Process) NPAPI Session
  • 36. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 NPAPI In Chrome (Today) Browser Tab (Process) Google Chrome (Broker Process) Trusted Plug-in (Process) NPAPI Sandbox Session • NPAPI now crosses a security boundary between sandboxed tabs and un-sandboxed plug-ins.
  • 37. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 NPAPI Exploits  NPAPI Callers were previously trusted...  ...Now they are not.  Flash and other plug-ins are currently not securely sandboxed.  Exploitable bugs in Adobe (and other vendors) code will allow sandbox-escape.  But these bugs were previously not vulnerabilities → Implicit Calling conventions?
  • 38. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 A benign crash? • Thread 9 *CRASHED* ( EXCEPTION_ACCESS_VIOLATION @ 0x09ccf232 ) 0x102e5c06 [NPSWF32.dll - memcpy.asm:257] memcpy 0x102e1828 [NPSWF32.dll + 0x002e1828] CBitStream::Fill(unsigned char const*, int) 0x102e0b96 [NPSWF32.dll + 0x002e0b96] mp3decFill 0x102e0892 [NPSWF32.dll + 0x002e0892] PlatformMp3Decoder::Refill(int,unsigned char*) 0x10063d21 [NPSWF32.dll + 0x00063d21] CMp3Decomp::GetDecompressedData(short*,int,int,int,int) 0x10063f62 [NPSWF32.dll + 0x00063f62] CMp3Decomp::Decompress(short *,int) 0x100ad448 [NPSWF32.dll + 0x000ad448] CoreSoundMix::BuildBuffer(int) 0x100ae2c5 [NPSWF32.dll + 0x000ae2c5] CoreSoundMix::SendBuffer(int,int) 0x10153d6b [NPSWF32.dll + 0x00153d6b] PlatformSoundMix::SoundThread() 0x10154034 [NPSWF32.dll + 0x00154034] PlatformSoundMix::SoundThreadFunc(void *) 0x7c80b728 [kernel32.dll + 0x0000b728] BaseThreadStart Full report @ http://crash/reportdetail?reportid=b370c132fc6587f7 Google Chrome 4.0.249.70 (Official Build 36218)  This was found by accident (using Chromium)  Fixed by Adobe!
  • 39. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Input events  Can also send key and mouse events.  NPP_InputEvent().  Possible to bypass Flash Security Dialogs  Enable web-cam  Enable Microphone  Plug-ins are currently unable to distinguish between user input and simulated input from renderer.  Hopefully this is fixed in “Pepper”.
  • 40. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Cheap Exploit #3
  • 41. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Handle Leaks  Handles which refer to privileged resources may exist in sandboxes for several reasons.  A handle can be used for any operation for which it has already been granted access.  If the right type of handle is leaked into the sandbox, it can be used for sandbox-escape.  These handles are easily detected at run-time!
  • 42. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 What causes “Handle Leaks”?  Deliberately granted by broker.  Accidentally granted by broker.  Incorrectly granted by broker (policy error)  Unclosed handles from sandbox initialisation  Before Lock-down (init. with unrestricted token)  Internal handles kept open by libraries  Internal handles kept open by 3rd Party Hook DLLs  Libraries in use must be “sandbox friendly”
  • 43. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Adobe Reader X Handle Leaks  Sandboxed renderer has write access to the Medium-integrity Internet Explorer cookie store, history etc.  The ARX broker also doesn't currently restrict read access to local file system.
  • 44. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Cheap Exploit #4
  • 45. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Clipboard Attacks  In PMIE and AR-X, the clipboard is shared between the sandbox and the rest of the user's session.  Ever put your password in the clipboard?  What about attacking other applications?  Previously, the clipboard contents were normally trustworthy, now they are not.
  • 46. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Clipboard Attacks  What about...  Pasting malicious command lines into a shell followed by a new line?  Inputting maliciously formatted data into the clipboard?  Do application developers implicitly trust clipboard contents?
  • 47. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 A counter-argument to Adobe’s view of the sandbox
  • 48. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
  • 49. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
  • 50. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
  • 51. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09
  • 52. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Conclusions
  • 53. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Conclusions  Developing sandbox escape exploits varies considerably between different implementations  Secondary (local) exploits cheaper to find and develop than the primary (remote) exploit.  Not necessarily a big disincentive for attackers.  Especially if the goal is to steal a resource available inside the sandbox!
  • 54. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Relative Security of Sandbox Implementations Google Chrome Renderer Adobe Reader X Protected Mode Internet Explorer Google Chrome Flash Plug-in Privilege Stripping No Sandbox More Protection Less Protection
  • 55. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Conclusions  Sandboxes have changed the exploitation landscape and will continue to do so  Greater emphasis on local privilege escalation  Desktop applications under greater scrutiny  New attack surfaces  When forced to attackers will start to adopt sandbox-aware malware.  Insufficient motivation to do so yet!  PMIE sandbox escapes only started getting attention when Pwn2Own made it a requirement of “own”.  There are now at least 4 un-patched PMIE escapes (source: Twitter).
  • 56. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 Any Questions? Twitter: @tkeetch tom.keetch@uk.verizonbusiness.com
  • 57. © 2009 Verizon. All Rights Reserved. PTEXXXXX XX/09 More information • My OWASP AppSec EU Slides – http://www.owasp.org/index.php/AppSecEU2011 • My Black Hat Briefings Europe 2011 Materials – https://blackhat.com/html/bh-eu-11/bh-eu-11-archives.html#Keetch • My Protected Mode IE Whitepaper – http://www.verizonbusiness.com/resources/whitepapers/wp_escapingmicrosoftprotectedmodeinte rnetexplorer_en_xg.pdf • My Hack.LU 2010 Presentation on Protected Mode IE – http://archive.hack.lu/2010/Keetch-Escaping-from-Protected-Mode-Internet-Explorer-slides.ppt • Richard Johnson: “Adobe Reader X: A Castle Built on Sand” – http://rjohnson.uninformed.org/Presentations/A%20Castle%20Made%20of%20Sand%20- %20final.pdf • Stephen Ridley: “Escaping the Sandbox” – http://www.recon.cx/2010/slides/Escaping_The_Sandbox_Stephen_A_Ridley_2010.pdf • Skywing: “Getting out of Jail: Escaping Internet Explorer Protected Mode” – http://www.uninformed.org/?v=8&a=6&t=sumry