Completed
Typical User-Mode Approach
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
The Windows Sandbox Paradox
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 What I'm Going to Talk About
- 3 Sandboxing Requirement #1
- 4 Typical User-Mode Approach
- 5 Object Security Descriptor
- 6 Resource Access Check
- 7 Owner Check
- 8 Kernel DACL Check
- 9 Kernel Access Check
- 10 Restricted Access Tokens
- 11 Restricted Token Access Check
- 12 Crash!
- 13 Process Initialization
- 14 Device Drivers
- 15 Opening a Device Name
- 16 Securing the Device
- 17 Example: Windows Sockets
- 18 Native Sockets
- 19 Accessing Resources
- 20 Direct Resource Access
- 21 Sharing Resource Access
- 22 Bad Registry
- 23 IE EPM Escape / Audio Server
- 24 Lack of Documentation
- 25 Broker Resource Access
- 26 Win32 Path Support
- 27 Legacy Filesystem Behaviour
- 28 Canonicalization
- 29 Device Escape Syntax
- 30 Invalid Character Checks
- 31 Hybrid Resource Access
- 32 Reparse Points
- 33 Mixed Semantics
- 34 Sharing Sections
- 35 Unnamed Resources
- 36 IPC Technologies
- 37 Named Pipes
- 38 Chrome CreateNamed Pipe IPC
- 39 Reducing Kernel Attack Surface
- 40 The Good Parts
- 41 LowBox Token Access Check
- 42 Integrity Level Check
- 43 Mandatory Integrity Level Checi