The Windows Sandbox Paradox

The Windows Sandbox Paradox

nullcon via YouTube Direct link

Kernel DACL Check

8 of 43

8 of 43

Kernel DACL Check

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

The Windows Sandbox Paradox

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 What I'm Going to Talk About
  3. 3 Sandboxing Requirement #1
  4. 4 Typical User-Mode Approach
  5. 5 Object Security Descriptor
  6. 6 Resource Access Check
  7. 7 Owner Check
  8. 8 Kernel DACL Check
  9. 9 Kernel Access Check
  10. 10 Restricted Access Tokens
  11. 11 Restricted Token Access Check
  12. 12 Crash!
  13. 13 Process Initialization
  14. 14 Device Drivers
  15. 15 Opening a Device Name
  16. 16 Securing the Device
  17. 17 Example: Windows Sockets
  18. 18 Native Sockets
  19. 19 Accessing Resources
  20. 20 Direct Resource Access
  21. 21 Sharing Resource Access
  22. 22 Bad Registry
  23. 23 IE EPM Escape / Audio Server
  24. 24 Lack of Documentation
  25. 25 Broker Resource Access
  26. 26 Win32 Path Support
  27. 27 Legacy Filesystem Behaviour
  28. 28 Canonicalization
  29. 29 Device Escape Syntax
  30. 30 Invalid Character Checks
  31. 31 Hybrid Resource Access
  32. 32 Reparse Points
  33. 33 Mixed Semantics
  34. 34 Sharing Sections
  35. 35 Unnamed Resources
  36. 36 IPC Technologies
  37. 37 Named Pipes
  38. 38 Chrome CreateNamed Pipe IPC
  39. 39 Reducing Kernel Attack Surface
  40. 40 The Good Parts
  41. 41 LowBox Token Access Check
  42. 42 Integrity Level Check
  43. 43 Mandatory Integrity Level Checi

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.