Overview
Syllabus
Introduction
whois Jasiel Spelman
Don't let mitigations get in your way!
Restricted Access Tokens
Job Object Limitations
Window Station and Desktop Isolation
Mandatory Integrity Control
Sandboxed Process Communication
Attack Surface Archetypes
Inter-Process Communication Handling
Shared Resources
Additional Vectors
Uncommon Attack Vectors
Internet Explorer Save As Dialog Sandbox Escape
Save File Dialog Abuse
Google Chrome Clipboard Sandbox Bypass
Clipboard Abuse
Internet Explorer Presentation test Sandbox Bypass
Elevation Policy Abuse
Google Chrome Symbolic Link Sandbox Escape
Symbolic Link Abuse
Conclusion
Drives Next Evolution in Exploits
Taught by
Black Hat