«
Expand/Collapse
48 items tagged "sandbox"
Related tags:
tar bz2 [+],
strace [+],
vulnerability [+],
whitepaper [+],
security [+],
java [+],
x sandbox [+],
use [+],
type safety [+],
predefined profiles [+],
predefined [+],
apple os x [+],
apple os [+],
apple events [+],
abu dhabi [+],
zero day [+],
vulnerabilities [+],
type [+],
slides [+],
remote [+],
privilege levels [+],
privilege [+],
oracle [+],
multiple [+],
linux kernel [+],
linus [+],
kinect [+],
java code [+],
inclusion [+],
iis [+],
holy grail [+],
hacks [+],
control [+],
chrome [+],
bypassing [+],
black hat [+],
avast [+],
automatically [+],
atomicreferencearray [+],
arbitrary code [+],
apple sandbox [+],
android [+],
adobe flash [+],
adobe [+],
access control system [+],
access [+],
vupen [+],
virtual sandbox [+],
version [+],
txt [+],
terrain [+],
stephen a. ridley tags [+],
sql injection [+],
shell [+],
secure [+],
resolution [+],
reader [+],
read [+],
pwn [+],
press release [+],
presentation [+],
play [+],
plans [+],
own [+],
os x [+],
ooo [+],
more [+],
mimicry [+],
matt conover [+],
malicious software [+],
local [+],
kernel mode [+],
grained sand [+],
google [+],
game [+],
fix [+],
first person [+],
file [+],
extends [+],
eventual goal [+],
evasion and escape [+],
digital projector [+],
davis [+],
darknet [+],
contests [+],
code [+],
breaks [+],
billy rios [+],
aslr [+],
apple fails [+],
apple [+],
analyzer [+],
adobe reader [+],
ExploitsVulnerabilities [+],
sydbox [+],
execve [+],
catbox [+],
Support [+]
-
-
21:34
»
Packet Storm Security Recent Files
Sydbox is a ptrace-based sandbox implementation. It intercepts system calls, checks for allowed filesystem prefixes, and denies them when checks fail. It has basic support for disallowing network connections. It has basic support to sandbox execve calls. It is based in part on catbox and strace.
-
21:34
»
Packet Storm Security Tools
Sydbox is a ptrace-based sandbox implementation. It intercepts system calls, checks for allowed filesystem prefixes, and denies them when checks fail. It has basic support for disallowing network connections. It has basic support to sandbox execve calls. It is based in part on catbox and strace.
-
21:34
»
Packet Storm Security Misc. Files
Sydbox is a ptrace-based sandbox implementation. It intercepts system calls, checks for allowed filesystem prefixes, and denies them when checks fail. It has basic support for disallowing network connections. It has basic support to sandbox execve calls. It is based in part on catbox and strace.
-
-
12:06
»
Hack a Day
Here’s another virtual sandbox meets real sandbox project. A team at UC Davis is behind this depth-mapped and digitally projected sandbox environment. The physical sandbox uses fine-grained sand which serves nicely as a projection surface as well as a building medium. It includes a Kinect depth camera over head, and an offset digital projector to [...]
-
-
16:55
»
Packet Storm Security Exploits
This Metasploit module exploits a vulnerability due to the fact that AtomicReferenceArray uses the Unsafe class to store a reference in an array directly, which may violate type safety if not used properly. This allows a way to escape the JRE sandbox, and load additional classes in order to perform malicious operations.
-
16:55
»
Packet Storm Security Recent Files
This Metasploit module exploits a vulnerability due to the fact that AtomicReferenceArray uses the Unsafe class to store a reference in an array directly, which may violate type safety if not used properly. This allows a way to escape the JRE sandbox, and load additional classes in order to perform malicious operations.
-
16:55
»
Packet Storm Security Misc. Files
This Metasploit module exploits a vulnerability due to the fact that AtomicReferenceArray uses the Unsafe class to store a reference in an array directly, which may violate type safety if not used properly. This allows a way to escape the JRE sandbox, and load additional classes in order to perform malicious operations.
-
-
19:11
»
Packet Storm Security Exploits
Core Security Technologies Advisory - Apple OS X suffered from a sandbox predefined profiles bypass vulnerability. Several of the default pre-defined sandbox profiles do not properly limit all the available mechanisms and therefore allow exercising part of the restricted functionality. Namely, sending Apple events is possible within the no-network sandbox (kSBXProfileNoNetwork). A compromised application hypothetically restricted by the use of the no-network profile may have access to network resources through the use of Apple events to invoke the execution of other applications not directly restricted by the sandbox.
-
19:11
»
Packet Storm Security Recent Files
Core Security Technologies Advisory - Apple OS X suffered from a sandbox predefined profiles bypass vulnerability. Several of the default pre-defined sandbox profiles do not properly limit all the available mechanisms and therefore allow exercising part of the restricted functionality. Namely, sending Apple events is possible within the no-network sandbox (kSBXProfileNoNetwork). A compromised application hypothetically restricted by the use of the no-network profile may have access to network resources through the use of Apple events to invoke the execution of other applications not directly restricted by the sandbox.
-
19:11
»
Packet Storm Security Misc. Files
Core Security Technologies Advisory - Apple OS X suffered from a sandbox predefined profiles bypass vulnerability. Several of the default pre-defined sandbox profiles do not properly limit all the available mechanisms and therefore allow exercising part of the restricted functionality. Namely, sending Apple events is possible within the no-network sandbox (kSBXProfileNoNetwork). A compromised application hypothetically restricted by the use of the no-network profile may have access to network resources through the use of Apple events to invoke the execution of other applications not directly restricted by the sandbox.
-
-
11:13
»
Hack a Day
The team at Monobanda have been working on a sandbox game called Mimicry that uses a Kinect to read the terrain of a sandbox. From the teaser video and press release, the eventual goal appears to be controlling both a character in the game and the environment simultaneously. By reading the terrain of the sandbox [...]
-
-
0:46
»
SecDocs
Authors:
Stephen A. Ridley Tags:
exploiting Event:
Black Hat Abu Dhabi 2010 Abstract: As many have predicted, 2010 will be the “Year of the Sandbox”. We will probably see many Commercial Off-The- Shelf (COTS) products using these sand-boxing technologies in the very near future starting this year. This presentation will discuss and demonstrate practical techniques for the evasion and escape of “Sand-boxing” technologies. Many techniques have been discussed but only vaguely at popular security conferences. Very little *actual* code and demonstrations have been performed. This presentation will consist mostly of demonstrations and review of actual code. I believe that most technical security talks these days don’t need to be longer than 20 minutes, so I only want to use my time to talk about real things and demonstrate real tools. I will demonstrate tools and techniques using Chromium and custom written “sandbox” examples. Some such subversion techniques discussed will be: * Injecting Interpreters into Sandboxes to test from the inside out * Using Kernel Mode debuggers to assist you (token exchange, IO, handle creation, IPC) windbg scripts incl. * Token Sniping/Stealing (whatever you call it) * Token inspection tools (includes a .h’d and dll’d version of Matt Conover’s dumptoken.c modified to include more Native API helpers) * Handle Sniping/Stealing (whatever you call it) * User32 Messaging tricks (no, not just SetWindowsHook ;-) None of these above techniques in this talk will be without example code or demonstrations! In addition to the above, this presentation will try to “fill in the gaps” where there seems to be a lot of vagaries around tokens and DACLs. Additionally I will talk about some of the practical considerations that makes deploying a sandbox with COTS products impractical on WindowsXP. There will be some other “goodies” that were also discovered in the course of this research such as: how to detect kernel mode debuggers from userspace, how userspace debugging works under the hood, (yet) undisclosed Chrome bugs, etc. I will also talk a bit about some areas of interest I wish to focus on in the future regarding these topics.
-
-
5:25
»
SecDocs
Tags:
Android Event:
Black Hat Abu Dhabi 2010 Abstract: The well-known way of breaking out of the Android sandbox is using a recent local Linux kernel exploit for privilege escalation. However, why always pick on Linus in Ring-0 when there is so much more to explore in user mode. Join me in a fascinating journey through Android's sandbox implementation with a lot of IPC endpoints, Services, Content providers, Serialisation, Permissions, Activities and much more, all scattered through multiple processes with different privilege levels. From a single point of entry we will build our majestic sandcastle in Android's sandbox, spanning multiple processes to hopefully obtain the holy grail of Android permissions: android.permission.INSTALL_PACKAGES
-
5:25
»
SecDocs
Tags:
Android Event:
Black Hat Abu Dhabi 2010 Abstract: The well-known way of breaking out of the Android sandbox is using a recent local Linux kernel exploit for privilege escalation. However, why always pick on Linus in Ring-0 when there is so much more to explore in user mode. Join me in a fascinating journey through Android's sandbox implementation with a lot of IPC endpoints, Services, Content providers, Serialisation, Permissions, Activities and much more, all scattered through multiple processes with different privilege levels. From a single point of entry we will build our majestic sandcastle in Android's sandbox, spanning multiple processes to hopefully obtain the holy grail of Android permissions: android.permission.INSTALL_PACKAGES
-
-
15:37
»
Hack a Day
Google has announced that it will be sponsoring a $20,000 prize at the 2011 CanSecWest Pwn2Own Contest. $20,ooo will be given to the first person to escape Chrome’s sandbox through Google-written code in the first day. If researchers are unsuccessful on the first day, then days two and three will be opened up to non-Google-written [...]
-
-
15:55
»
Packet Storm Security Recent Files
Sydbox is a ptrace-based sandbox implementation. It intercepts system calls, checks for allowed filesystem prefixes, and denies them when checks fail. It has basic support for disallowing network connections. It has basic support to sandbox execve calls. It is based in part on catbox and strace.
-
15:55
»
Packet Storm Security Tools
Sydbox is a ptrace-based sandbox implementation. It intercepts system calls, checks for allowed filesystem prefixes, and denies them when checks fail. It has basic support for disallowing network connections. It has basic support to sandbox execve calls. It is based in part on catbox and strace.
-
15:55
»
Packet Storm Security Misc. Files
Sydbox is a ptrace-based sandbox implementation. It intercepts system calls, checks for allowed filesystem prefixes, and denies them when checks fail. It has basic support for disallowing network connections. It has basic support to sandbox execve calls. It is based in part on catbox and strace.
-
-
21:01
»
Packet Storm Security Tools
Sydbox is a ptrace-based sandbox implementation. It intercepts system calls, checks for allowed filesystem prefixes, and denies them when checks fail. It has basic support for disallowing network connections. It has basic support to sandbox execve calls. It is based in part on catbox and strace.
-
21:01
»
Packet Storm Security Recent Files
Zero Day Initiative Advisory 10-201 - This vulnerability allows remote attackers to break out of the Java Sandbox implemented by Oracle's relational database. Authentication is required in that a user must be able to create a Java stored procedure to trigger the issue. The specific flaw exists within Oracle's custom SecurityManager implementation. Due to the implementation's dependence on a flag of a particular object to determine success or failure of a privileged call, a race condition exists which will allow one to execute Java code bypassing the sandbox. Successful exploitation will allow an attacker to execute arbitrary code in the context of the server.
-
21:01
»
Packet Storm Security Advisories
Zero Day Initiative Advisory 10-201 - This vulnerability allows remote attackers to break out of the Java Sandbox implemented by Oracle's relational database. Authentication is required in that a user must be able to create a Java stored procedure to trigger the issue. The specific flaw exists within Oracle's custom SecurityManager implementation. Due to the implementation's dependence on a flag of a particular object to determine success or failure of a privileged call, a race condition exists which will allow one to execute Java code bypassing the sandbox. Successful exploitation will allow an attacker to execute arbitrary code in the context of the server.
-
19:41
»
Packet Storm Security Tools
Sydbox is a ptrace-based sandbox implementation. It intercepts system calls, checks for allowed filesystem prefixes, and denies them when checks fail. It has basic support for disallowing network connections. It has basic support to sandbox execve calls. It is based in part on catbox and strace.
-
-
20:01
»
Packet Storm Security Tools
Sydbox is a ptrace-based sandbox implementation. It intercepts system calls, checks for allowed filesystem prefixes, and denies them when checks fail. It has basic support for disallowing network connections. It has basic support to sandbox execve calls. It is based in part on catbox and strace.
-
20:01
»
Packet Storm Security Recent Files
Sydbox is a ptrace-based sandbox implementation. It intercepts system calls, checks for allowed filesystem prefixes, and denies them when checks fail. It has basic support for disallowing network connections. It has basic support to sandbox execve calls. It is based in part on catbox and strace.
-
-
20:01
»
Packet Storm Security Tools
Sydbox is a ptrace-based sandbox implementation. It intercepts system calls, checks for allowed filesystem prefixes, and denies them when checks fail. It has basic support for disallowing network connections. It has basic support to sandbox execve calls. It is based in part on catbox and strace.
-
20:00
»
Packet Storm Security Recent Files
Sydbox is a ptrace-based sandbox implementation. It intercepts system calls, checks for allowed filesystem prefixes, and denies them when checks fail. It has basic support for disallowing network connections. It has basic support to sandbox execve calls. It is based in part on catbox and strace.
-
-
17:01
»
Packet Storm Security Tools
Sydbox is a ptrace-based sandbox implementation. It intercepts system calls, checks for allowed filesystem prefixes, and denies them when checks fail. It has basic support for disallowing network connections. It has basic support to sandbox execve calls. It is based in part on catbox and strace.
-
17:01
»
Packet Storm Security Recent Files
Sydbox is a ptrace-based sandbox implementation. It intercepts system calls, checks for allowed filesystem prefixes, and denies them when checks fail. It has basic support for disallowing network connections. It has basic support to sandbox execve calls. It is based in part on catbox and strace.
-
-
22:00
»
Packet Storm Security Tools
sydbox is a ptrace-based sandbox implementation. It intercepts system calls, checks for allowed filesystem prefixes, and denies them when checks fail. It has basic support for disallowing network connections. It has basic support to sandbox execve calls. It is based in part on catbox and strace.
-
-
14:00
»
Packet Storm Security Tools
sydbox is a ptrace-based sandbox implementation. It intercepts system calls, checks for allowed filesystem prefixes, and denies them when checks fail. It has basic support for disallowing network connections. It has basic support to sandbox execve calls. It is based in part on catbox and strace.