Application Sandboxes: Know thy limits

By Rahul Kashyap on 28 Jan 2014 @ Owasp App Sec California
📹 Video 🔗 Link
application-pentesting reverse-engineering vulnerability-management exploit-development
Focus Areas: Application Security , Malware Analysis , Penetration Testing , Reverse Engineering , Vulnerability Management

Presentation Material

Abstract

As we secure applications leveraging sandboxes, it is important to understand the attack surface as it presents opportunities for attackers. In this talk we’ll decompose application sandboxes from the lens of a pen-tester. We look at various popular sandboxes such as Google Chrome, Adobe ReaderX, and Sandboxie, amongst others, and discuss the limitations of each technology and its implementation details. Further, we discuss in depth with live exploits how to break out of each category of sandbox by leveraging various kernel and user mode exploits – something that future malware could leverage. Some of these exploit vectors have not been discussed widely and awareness is important.