Quantcast
Viewing all articles
Browse latest Browse all 8064

Thinking outside the sandbox

Attacking the modern browser and its plug-ins is becoming harder as vendors employ numerous
mitigation technologies to increase the cost of exploit development. An attacker is now forced to
uncover multiple vulnerabilities to gain privileged-level code execution on his targets. First, an
attacker needs to find a vulnerability, leak an address to get around ASLR, and bypass DEP to gain
code execution within the renderer process. The attacker then needs to bypass the application
sandbox to elevate their privileges, which will allow them to execute malicious code. Our journey
begins at the sandbox and investigates some of the more obscure techniques used to violate this
trust boundary.


more here............http://h30499.www3.hp.com/hpeb/attachments/hpeb/off-by-on-software-security-blog/414/1/HPSR%20SecurityBriefing_Episode17_sandboxbypass.pdf

Image may be NSFW.
Clik here to view.

Viewing all articles
Browse latest Browse all 8064

Trending Articles