Completed
Securing the Device
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
The Windows Sandbox Paradox
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 What I'm Going to Talk About
- 3 Sandboxing Requirement #1
- 4 Typical User-Mode Approach
- 5 Object Security Descriptor
- 6 Resource Access Check
- 7 Owner Check
- 8 Kernel DACL Check
- 9 Kernel Access Check
- 10 Restricted Access Tokens
- 11 Restricted Token Access Check
- 12 Crash!
- 13 Process Initialization
- 14 Device Drivers
- 15 Opening a Device Name
- 16 Securing the Device
- 17 Example: Windows Sockets
- 18 Native Sockets
- 19 Accessing Resources
- 20 Direct Resource Access
- 21 Sharing Resource Access
- 22 Bad Registry
- 23 IE EPM Escape / Audio Server
- 24 Lack of Documentation
- 25 Broker Resource Access
- 26 Win32 Path Support
- 27 Legacy Filesystem Behaviour
- 28 Canonicalization
- 29 Device Escape Syntax
- 30 Invalid Character Checks
- 31 Hybrid Resource Access
- 32 Reparse Points
- 33 Mixed Semantics
- 34 Sharing Sections
- 35 Unnamed Resources
- 36 IPC Technologies
- 37 Named Pipes
- 38 Chrome CreateNamed Pipe IPC
- 39 Reducing Kernel Attack Surface
- 40 The Good Parts
- 41 LowBox Token Access Check
- 42 Integrity Level Check
- 43 Mandatory Integrity Level Checi