pwncollege
DojosLeaderboardCommunity
Back to cse466-f2024

Sandboxing

cse466-f2024
0/18 challenges completed

Computer security sandboxing refers to a technique used to isolate potentially malicious code or untrusted programs, ensuring they run in a confined environment where they cannot cause harm to the broader system. By creating a 'sandbox' or restricted space for these programs to operate in, any malicious actions are confined to this isolated area, preventing potential damage to the host system or access to sensitive data. This module explores sandboxing techniques as well as how hackers can escape a misconfigured sandbox.

Note, levels 14+ of the sandboxing challenges must be ran inside a virtual machine. This virtual machine can be launched using the vm connect command while at a terminal.

Sandboxing: Introduction
Video
Slides
Sandboxing: chroot
Video
Slides
Sandboxing: seccomp
Video
Slides
Sandboxing: Escaping seccomp
Video
Slides
Sandboxing: Namespacing Live Sesssion 1
Video
1
chroot-escape-basic
Sandboxing: Namespacing Live Sesssion 2
Video
2
chroot-shellcode
Tips, Tricks, and Further Reading
3
chroot-proper
Class - Robert - 2024.11.05
Video
Slides
Class - Robert - 2024.11.07
Video
4
seccomp-basic
5
seccomp-linkat
6
seccomp-fchdir
7
seccomp-rechroot
8
seccomp-only
9
seccomp-arch32
10
seccomp-minimal
11
seccomp-timebased
12
seccomp-readonly
13
process-isolation
14
mount-namespace
15
mount-cleanup
16
mount-readonly
17
mount-shellcode
18
mount-bindmount