'Sandbox'에 해당되는 글 3건

  1. 2012.03.06 Run a Program in the Sandbox (COMODO)
  2. 2011.09.08 XSSS: Cross Site Scripting Scanning (1)
  3. 2010.07.21 Adobe Reader’s sandboxing model
2012.03.06 10:24

Run a Program in the Sandbox (COMODO)

Comodo Internet Security allows you to run programs inside the Sandbox on a 'one-off' basis. This is helpful to test the behavior of new executables that you have downloaded or for applications that you are not sure that you trust. Adding a program in this way means that it will run in the Sandbox this time only. On subsequent executions it will not run in the sandbox (presuming it passes the sandboxing process). If you wish to run an application in the sandbox on a long-term/permanent basis then use the  Always Sandbox interface.


To run an application in the Sandbox

1. Click the 'Run a Program in the Sandbox' link in the Defense+  interface. The following dialog will open:


2. Click 'Select' to choose the program to be executed in the sandbox:


3. Browse to the application and click 'Open'. In the example above, opera.exe is chosen:


4. Click 'Run As' and select the restriction level you want to apply to the program from the menu.

  • Untrusted - The application is not allowed to access any of the Operating system resources. The application is not allowed to execute more than 10 processes at a time and is run with very limited access rights.
Note: Some of the applications that require user interaction may not work properly under this setting.
  • Restricted - The application is allowed to access very few operating system resources. The application is not allowed to execute more than 10 processes at a time and is run with very limited access rights.
Note: Some of the applications like computer games may not work properly under this setting.
  • Limited - Only selected operating system resources can be accessed by the application. The application is not allowed to execute more than 10 processes at a time and is run with out Administrator account privileges.

  • Partially Limited - The application is allowed to access all the Operating system files and resources like clipboard. Modification of protected files/registry keys is not allowed. Privileged operations like loading drivers or debugging other applications are also not allowed.


The program is executed within the sandbox with the access restriction level that you selected. It will run in the Sandbox on this occasion only.


출처 : COMODO


Trackback 0 Comment 0
2011.09.08 20:02

XSSS: Cross Site Scripting Scanning

XSSS Software is a brute force cross site scripting scanner. developed by Sven. We hope soon the new and improved version is released with more features.

Features

  • Crawl website
  • Detect forms and URLs with parameters
  • Fill in forms, alter parameters to include control characters
  • Scan web server response for our input

What does it look for

  • Code in web pages
  • JavaScript aka JScript, ECMAScript
  • VBScript
  • Exploits for browser security hole:
  • Buffer overruns,
  • Java sandbox holes,
  • ActiveX components marked as “safe”.

Download:

XSSS v0.4.0b  – http://www.sven.de/xsss/xsss-0.40b.tar.gz



출처 : PenTestIT

Trackback 0 Comment 1
  1. Favicon of http://linuxtip.net guk 2011.09.09 14:46 address edit & del reply

    서버 점검시에 이용하면 좋겠네요. 고맙습니다. ^^

2010.07.21 18:10

Adobe Reader’s sandboxing model

컴퓨터월드의 보도에 따르면, 우리가 흔히 애크로뱃 리더라고 부르는 어도비의 Reader가 취약점 공격의 영향을 최소화하기 위해 다음 버전부터 샌드박스 모델을 도입할 예정이라고 합니다.

작년 경부터 PDF 파일을 이용한 보안 침해사고가 계속 증가하고 있는데 환영할 만한 일이라 생각합니다. 버전 10부터 도입될 예정이고 이 버전은 올해 내로 발표될 예정이지만 더 정확한 일정은 알려지지 않았습니다.

위 기사에서 보시는 것처럼 마이크로소프트도 인터넷 익스플로러 7부터 ‘보호 모드’라는 이름으로 일종의 샌드박싱을 구현했고 오피스 2010에서도 유사한 보호 장치를 마련했습니다. 구글의 크롬 역시 그렇습니다. 네트워크의 형태이든 파일의 형태이든 외부에서 입력을 받아들여 파싱해야 하는 애플리케이션이라면 이제는 보안을 고려한 설계가 필수가 돼 가고 있습니다.



Adobe adding 'sandbox' to PDF Reader to ward off hacker attacks
http://www.zdnet.com/blog/security/adobe-adding-sandbox-to-pdf-reader-to-ward-off-hacker-attacks/6886


Trackback 0 Comment 0