Completed
Clipboard Abuse
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Thinking Outside the Sandbox - Violating Trust Boundaries in Uncommon Ways
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 whois Jasiel Spelman
- 3 Don't let mitigations get in your way!
- 4 Restricted Access Tokens
- 5 Job Object Limitations
- 6 Window Station and Desktop Isolation
- 7 Mandatory Integrity Control
- 8 Sandboxed Process Communication
- 9 Attack Surface Archetypes
- 10 Inter-Process Communication Handling
- 11 Shared Resources
- 12 Additional Vectors
- 13 Uncommon Attack Vectors
- 14 Internet Explorer Save As Dialog Sandbox Escape
- 15 Save File Dialog Abuse
- 16 Google Chrome Clipboard Sandbox Bypass
- 17 Clipboard Abuse
- 18 Internet Explorer Presentation test Sandbox Bypass
- 19 Elevation Policy Abuse
- 20 Google Chrome Symbolic Link Sandbox Escape
- 21 Symbolic Link Abuse
- 22 Conclusion
- 23 Drives Next Evolution in Exploits