Completed
Introduction
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Sandboxes: Understanding and Exploiting Application Security Limitations
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Agenda
- 3 What is a sandbox
- 4 Types of sandbox
- 5 OS internals
- 6 Type A Sandbox
- 7 Type B Sandbox
- 8 Master vs Slave
- 9 Object Integrity Levels
- 10 Resistance to malicious slaves
- 11 Adobe Reader
- 12 Chrome
- 13 Chrome Browser
- 14 Pinkie Pie
- 15 syscall filter
- 16 how it works
- 17 exploit
- 18 serious problem
- 19 user mode exploits
- 20 LPC ports
- 21 Adobe Reader vs Chrome
- 22 PDF brute force
- 23 CS RSS vulnerability
- 24 CS RSS exploit
- 25 Defense indepth
- 26 Conclusion