29
Sandbox Exploitations - ECE 4112 Group 12 - Gary Kao Jimmy Vuong

Sandbox Exploitations - ECE 4112 Group 12 - Gary Kao Jimmy Vuong

Embed Size (px)

Citation preview

Page 1: Sandbox Exploitations - ECE 4112 Group 12 - Gary Kao Jimmy Vuong

Sandbox Exploitations- ECE 4112 Group 12 -

Gary Kao

Jimmy Vuong

Page 2: Sandbox Exploitations - ECE 4112 Group 12 - Gary Kao Jimmy Vuong

Sandboxes

Introduction

Background Objectives Results ConclusionTesting References- - - - - -

• Sandboxes are a specific type of virtualization, like VMware.

• Usually used to test untrusted apps

• Effective since optimal sandboxes can purge all data stored on computer after sandbox was run.

Page 3: Sandbox Exploitations - ECE 4112 Group 12 - Gary Kao Jimmy Vuong

Significance of Sandbox

Introduction

Background Objectives Results ConclusionTesting References- - - - - -

• All files downloaded after sandbox is initiated will be removed by restarting.

• Upon restarting, the sandbox should be free of malware, should be unable to detect the OS, and should be able to close within itself. (like loading up taskmngr within sandbox)

Page 4: Sandbox Exploitations - ECE 4112 Group 12 - Gary Kao Jimmy Vuong

Advantages

Introduction

Background Objectives Results ConclusionTesting References- - - - - -

• Can read objects on the real HD and the files in the sandbox.

• All write operations are done in a Transient Storage Area and never on the HD unless specified.

• Does not allow service installation.

• Applications are typically run already sandboxed.

Page 5: Sandbox Exploitations - ECE 4112 Group 12 - Gary Kao Jimmy Vuong

Disadvantages

Introduction

Background Objectives Results ConclusionTesting References- - - - - -

• Sandbox can contain good and bad objects.

• If the user doesn't know the difference between good and bad objects, he still can infect his own computer by moving the bad objects to his real harddisk.

Page 6: Sandbox Exploitations - ECE 4112 Group 12 - Gary Kao Jimmy Vuong

Programs Used

Introduction

Background Objectives Results ConclusionTesting References- - - - - -

• Sandboxie

• Shadow Surfer

• Virtual Sandbox

Page 7: Sandbox Exploitations - ECE 4112 Group 12 - Gary Kao Jimmy Vuong

• Creates an isolated storage space that stores all the temporary files.

• Puts a # in the title when its on.• Both the sandbox and the actual HD function

at the same time, as opposed to SS and VS.

Transparent layer Hard drivePrograms

Introduction

Background Objectives Results ConclusionTesting References- - - - - -

Sandboxie

Page 8: Sandbox Exploitations - ECE 4112 Group 12 - Gary Kao Jimmy Vuong

Introduction

Background Objectives Results ConclusionTesting References- - - - - -

Sandboxie• Pros:

– Freeware– Small program (309kb)– System Resource efficient

• Cons:– Must manually load up programs for

sandboxing– Does not screen auto-run programs (e.g. USB

Key Logger)

Page 9: Sandbox Exploitations - ECE 4112 Group 12 - Gary Kao Jimmy Vuong

• Shadow Mode: snapshot of your volume and in a virtual PC or server state.

• any changes made to the computer thereafter are made to the Shadow Mode duplicate.

• Unless specified,Shadow Mode resetsupon reboot.

Shadow Surfer

Introduction

Background Objectives Results ConclusionTesting References- - - - - -

Page 10: Sandbox Exploitations - ECE 4112 Group 12 - Gary Kao Jimmy Vuong

Introduction

Background Objectives Results ConclusionTesting References- - - - - -

Shadow Surfer• Pros:

– Runs constantly– Easy to use

• Cons:– Paidware– Files are saved where they actually should be– Relies on restarts for cleaning and blocking

Page 11: Sandbox Exploitations - ECE 4112 Group 12 - Gary Kao Jimmy Vuong

• Operates like a firewall

• Creates an isolated environment through which programs anddownloaded files operate.

• Does not give access tointernet (by default)

• Does not allow overwriting of files (by default)

Introduction

Background Objectives Results ConclusionTesting References- - - - - -

Virtual Sandbox

Page 12: Sandbox Exploitations - ECE 4112 Group 12 - Gary Kao Jimmy Vuong

Introduction

Background Objectives Results ConclusionTesting References- - - - - -

Virtual Sandbox• Pros:

– Once enabled, everything is sandboxed.– Files are saved in a transient storage space.

• Cons:– Paidware– Easy to bypass

Page 13: Sandbox Exploitations - ECE 4112 Group 12 - Gary Kao Jimmy Vuong

• Test various Sandbox programs.

• Use methods developed in past labs to test the various programs’ vulnerabilities.

• Document the tests and results.

• Summarize results and show vulnerabilities.

Exploiting Sandboxes

Introduction

Background Objectives Results ConclusionTesting References- - - - - -

Page 14: Sandbox Exploitations - ECE 4112 Group 12 - Gary Kao Jimmy Vuong

Testbed

Introduction

Background Objectives Results ConclusionTesting References- - - - - -

• 3 Identical Virtual Machines using Windows XP

• Each VM has a sandbox installed

• Each VM goes through the same series of tests

• After the tests are performed, the computers are restarted to see whether they are clean or not

Page 15: Sandbox Exploitations - ECE 4112 Group 12 - Gary Kao Jimmy Vuong

• Create file, then clear the sandbox and see if the file still exists.

• Sandboxie: – erased

• Virtual Sandbox: – erased

• Shadow Surfer – erased

File Storage

Introduction

Background Objectives Results ConclusionTesting References- - - - - -

Page 16: Sandbox Exploitations - ECE 4112 Group 12 - Gary Kao Jimmy Vuong

• Loaded a sandboxed Task Manager to try and close the sandbox.

• Sandboxie:

– Failed closing Sandboxie

• Virtual Sandbox:

– Closed Virtual Sandbox

• Shadow Surfer

– Closing ShadowSurfer, but still sandboxed

Closing a Process

Introduction

Background Objectives Results ConclusionTesting References- - - - - -

Page 17: Sandbox Exploitations - ECE 4112 Group 12 - Gary Kao Jimmy Vuong

• Checking to see if local vulnerabilities are still affected

• Sandboxie: – Succeeded

• Virtual Sandbox: – Blocked

• Shadow Surfer – Succeeded

Jpeg of Death

Introduction

Background Objectives Results ConclusionTesting References- - - - - -

Page 18: Sandbox Exploitations - ECE 4112 Group 12 - Gary Kao Jimmy Vuong

Dcom Crash

Introduction

Background Objectives Results ConclusionTesting References- - - - - -

• Checking to see if remote vulnerabilties are still affected

• Sandboxie: – Crashed

• Virtual Sandbox: – Crashed, but notifies you that these apps are being exploited

• Shadow Surfer – Crashed

Page 19: Sandbox Exploitations - ECE 4112 Group 12 - Gary Kao Jimmy Vuong

• Sandboxie: – Succeeded

• Virtual Sandbox: – Uses dll hook, which results it not even initi

ating properly• Shadow Surfer

– Succeeded

HackerDefender

Introduction

Background Objectives Results ConclusionTesting References- - - - - -

Page 20: Sandbox Exploitations - ECE 4112 Group 12 - Gary Kao Jimmy Vuong

• Sandboxie: – Succeeded

• Virtual Sandbox: – Succeeded

• Shadow Surfer – Succeeded

FU

Introduction

Background Objectives Results ConclusionTesting References- - - - - -

Page 21: Sandbox Exploitations - ECE 4112 Group 12 - Gary Kao Jimmy Vuong

• Sending files via netcat, will the files persist after clearing sandbox?

• Sandboxie: – Succeeded

• Virtual Sandbox: – Succeeded

• Shadow Surfer – Succeeded

Netcat

Introduction

Background Objectives Results ConclusionTesting References- - - - - -

Page 22: Sandbox Exploitations - ECE 4112 Group 12 - Gary Kao Jimmy Vuong

• Sandboxie: – Remote mouse/keyboard deactivated by

Sandboxie• Virtual Sandbox:

– Succeeded• Shadow Surfer

– Succeeded

VNC

Introduction

Background Objectives Results ConclusionTesting References- - - - - -

Page 23: Sandbox Exploitations - ECE 4112 Group 12 - Gary Kao Jimmy Vuong

• Sandboxie:

– Succeeded

• Virtual Sandbox:

– Succeeded

• Shadow Surfer

– Succeeded

AnnaKournikova Worm

Introduction

Background Objectives Results ConclusionTesting References- - - - - -

Page 24: Sandbox Exploitations - ECE 4112 Group 12 - Gary Kao Jimmy Vuong

• Sandboxie:

– Succeeded

• Virtual Sandbox:

– Blocked

• Shadow Surfer

– Succeeded

SDBot

Introduction

Background Objectives Results ConclusionTesting References- - - - - -

Page 25: Sandbox Exploitations - ECE 4112 Group 12 - Gary Kao Jimmy Vuong

• Sandboxie: – clean

• Virtual Sandbox: – SDbot and hxdef remain

• Shadow Surfer – clean

Restarting Sandbox

Introduction

Background Objectives Results ConclusionTesting References- - - - - -

Page 26: Sandbox Exploitations - ECE 4112 Group 12 - Gary Kao Jimmy Vuong

• Even if exploitations gets through sandbox, most will be gone after the sandbox is wiped.

• on weaker sandboxes, sdbot and hxdef persists even after sandbox wipes.– Fatal for Virtual Sandbox

Results

Introduction

Background Objectives Results ConclusionTesting References- - - - - -

Page 27: Sandbox Exploitations - ECE 4112 Group 12 - Gary Kao Jimmy Vuong

• Optimal Sandboxes will appear transparent to the users.

• Sandboxie most efficient Sandbox tool available for individual programs.

• Shadow Surfer most efficient overall.

Conclusion

Introduction

Background Objectives Results ConclusionTesting References- - - - - -

Page 28: Sandbox Exploitations - ECE 4112 Group 12 - Gary Kao Jimmy Vuong

• Sandboxie– http://www.sandboxie.com/

• Shadow Surfer– http://www.storagecraft.com/products/

ShadowSurfer/• Virtual Sandbox

– http://www.fortresgrand.com/products/vsb/vsb.htm

References

Introduction

Background Objectives Results ConclusionTesting References- - - - - -

Page 29: Sandbox Exploitations - ECE 4112 Group 12 - Gary Kao Jimmy Vuong

Questions?

- Sandbox Vulnerabilities -