Are You My Type? Breaking .NET Sandboxes Through Serialization

Are You My Type? Breaking .NET Sandboxes Through Serialization

Black Hat via YouTube Direct link

NET Remoting Architecture

12 of 32

12 of 32

NET Remoting Architecture

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Are You My Type? Breaking .NET Sandboxes Through Serialization

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 What is Serialization?
  3. 3 Why Serialization?
  4. 4 NET Serialization Support
  5. 5 Binary Serialization
  6. 6 What does it look like?
  7. 7 Badly Written Applications
  8. 8 ISerializable Interface
  9. 9 ISerializable Deserializing
  10. 10 Just Being Malicious
  11. 11 Demonstration
  12. 12 NET Remoting Architecture
  13. 13 Marshal By Reference
  14. 14 Marshal By Value
  15. 15 More Active Attacks
  16. 16 Path Normalization
  17. 17 Bypassing Type Filtering
  18. 18 How to protect against this?
  19. 19 Partial Trust Sandboxes
  20. 20 Code Access Security
  21. 21 XBAP Exception Handling AppDomain Boundary
  22. 22 ISerializable Redux
  23. 23 Type Conversion AppDomain Boundary
  24. 24 EvidenceBase.Clone
  25. 25 Exploiting It!
  26. 26 Delegate Multicasting
  27. 27 Serialized Delegate
  28. 28 Type Confusion
  29. 29 Reflection Attack
  30. 30 Hashtable Serialization
  31. 31 Hashtable Exploit AppDomain Boundary
  32. 32 Review

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.