Overview
Syllabus
Intro
What I'm Going to Talk About
Sandboxing Requirement #1
Typical User-Mode Approach
Object Security Descriptor
Resource Access Check
Owner Check
Kernel DACL Check
Kernel Access Check
Restricted Access Tokens
Restricted Token Access Check
Crash!
Process Initialization
Device Drivers
Opening a Device Name
Securing the Device
Example: Windows Sockets
Native Sockets
Accessing Resources
Direct Resource Access
Sharing Resource Access
Bad Registry
IE EPM Escape / Audio Server
Lack of Documentation
Broker Resource Access
Win32 Path Support
Legacy Filesystem Behaviour
Canonicalization
Device Escape Syntax
Invalid Character Checks
Hybrid Resource Access
Reparse Points
Mixed Semantics
Sharing Sections
Unnamed Resources
IPC Technologies
Named Pipes
Chrome CreateNamed Pipe IPC
Reducing Kernel Attack Surface
The Good Parts
LowBox Token Access Check
Integrity Level Check
Mandatory Integrity Level Checi
Taught by
nullcon