Thinking Outside the Sandbox - Violating Trust Boundaries in Uncommon Ways

Thinking Outside the Sandbox - Violating Trust Boundaries in Uncommon Ways

Black Hat via YouTube Direct link

Introduction

1 of 23

1 of 23

Introduction

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Thinking Outside the Sandbox - Violating Trust Boundaries in Uncommon Ways

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 whois Jasiel Spelman
  3. 3 Don't let mitigations get in your way!
  4. 4 Restricted Access Tokens
  5. 5 Job Object Limitations
  6. 6 Window Station and Desktop Isolation
  7. 7 Mandatory Integrity Control
  8. 8 Sandboxed Process Communication
  9. 9 Attack Surface Archetypes
  10. 10 Inter-Process Communication Handling
  11. 11 Shared Resources
  12. 12 Additional Vectors
  13. 13 Uncommon Attack Vectors
  14. 14 Internet Explorer Save As Dialog Sandbox Escape
  15. 15 Save File Dialog Abuse
  16. 16 Google Chrome Clipboard Sandbox Bypass
  17. 17 Clipboard Abuse
  18. 18 Internet Explorer Presentation test Sandbox Bypass
  19. 19 Elevation Policy Abuse
  20. 20 Google Chrome Symbolic Link Sandbox Escape
  21. 21 Symbolic Link Abuse
  22. 22 Conclusion
  23. 23 Drives Next Evolution in Exploits

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.