pwncollege
DojosLeaderboardCommunity
Back to system-security

Sandboxing

system-security
0/18 challenges completed

Computer security sandboxing refers to a technique used to isolate potentially malicious code or untrusted programs, ensuring they run in a confined environment where they cannot cause harm to the broader system. By creating a 'sandbox' or restricted space for these programs to operate in, any malicious actions are confined to this isolated area, preventing potential damage to the host system or access to sensitive data. This module explores sandboxing techniques as well as how hackers can escape a misconfigured sandbox.

Sandboxing: Introduction
Video
Slides
Tips, Tricks, and Further Reading

Filesystem Sandboxing

Sandboxing: chroot
Video
Slides
1
chroot-escape-basic
2
chroot-shellcode
3
chroot-proper

System Call Sandboxing

Sandboxing: seccomp
Video
Slides
Sandboxing: Escaping seccomp
Video
Slides
4
seccomp-basic
5
seccomp-linkat
6
seccomp-fchdir
7
seccomp-rechroot
8
seccomp-only
9
seccomp-arch32
10
seccomp-minimal
11
seccomp-timebased
12
seccomp-readonly
13
process-isolation

Sandboxing via Namespaces

Sandboxing: Namespacing Live Session 1
Video
Sandboxing: Namespacing Live Session 2
Video
14
mount-namespace
15
mount-cleanup
16
mount-readonly
17
mount-shellcode
18
mount-bindmount