Overview
Syllabus
Intro
Types of Sandboxes
Windows Internals
State of Windows Security
How does Sandbox work
Example
OS Enhancement Based Sandbox
The Problem
First Vulnerability
Bypass the Sandbox
Buffer Zone Pro Bypass
Secret File Bypass
Type 2 Sandboxes
Type 2 Sandbox
Chromium Sandbox
Chromium Documentation
Chrome Sandbox Demo
Can the Sandbox Stand Ground
Adobe Reader Exploit
Chrome Exploit
untrusted integrity level
podium contest
kernel vulnerability
truetype vulnerability
duotext vulnerability
methodology
Truetype vulnerabilities
Acrobat Reader
Result
Windows kernel vulnerabilities
Alternatives
The Real Solution
Taught by
Black Hat