![Very Happy :D](images/smilies/icon_biggrin.gif)
Search found 21 matches
- Mon May 13, 2013 4:22 pm
- Forum: Beta Version 4.01
- Topic: [.09] Drop Rights problem / Chrome PDF issues
- Replies: 13
- Views: 9616
- Sun May 12, 2013 6:46 pm
- Forum: Beta Version 4.01
- Topic: [.09] Drop Rights problem / Chrome PDF issues
- Replies: 13
- Views: 9616
- Wed Apr 10, 2013 2:10 pm
- Forum: Beta Version 4.01
- Topic: [.05] Major slowness with 4.01
- Replies: 22
- Views: 14467
- Wed Mar 20, 2013 11:29 pm
- Forum: Problem Reports
- Topic: Using kernel exploits to bypass Sandboxie
- Replies: 5
- Views: 4716
hi. actualy is the windows weak t2embed.dll true type font engine vulnerability and not a sandboxie weak architecture duqu (stuxnet family) can explot exactly that to access kernel to bypass all(?) security programs a temporary workaround is :Resource Access > File Access > Blocked Access and add c:...
- Mon Mar 18, 2013 2:53 pm
- Forum: Problem Reports
- Topic: Sandboxie bypassed
- Replies: 91
- Views: 27542
- Sun Mar 17, 2013 11:54 am
- Forum: Problem Reports
- Topic: Sandboxie bypassed
- Replies: 91
- Views: 27542
- Sat Mar 16, 2013 9:30 pm
- Forum: Problem Reports
- Topic: Sandboxie bypassed
- Replies: 91
- Views: 27542
- Sat Mar 16, 2013 9:01 pm
- Forum: Problem Reports
- Topic: Sandboxie bypassed
- Replies: 91
- Views: 27542
theoretically as tzuk said the sandboxie will isolate it perfectly i just received a sample of that trojan and i will try it in the real sytem :twisted: i hope its the right trojan as buster mentioned i want to see if the SetWindowLong and SetWindowLongPtr can be used to bypass sandboxibe be patient...
- Sat Mar 16, 2013 7:40 pm
- Forum: Problem Reports
- Topic: Sandboxie bypassed
- Replies: 91
- Views: 27542
hi . as tzuk said "I would like to revise my earlier comments about this. I was reading up on this a bit and it seems that a process can't use SetWindowLong (or SetWindowLongPtr) to adjust the window procedure address for a window which belongs to another process. " according tzuk the gabz cant work...
- Sat Mar 16, 2013 7:03 pm
- Forum: Problem Reports
- Topic: Sandboxie bypassed
- Replies: 91
- Views: 27542
confirmed: its a gabz family variant B and injecting a shellcode into explorer.exe address space how it works: http://www.welivesecurity.com/2012/12/27/win32gapz-steps-of-evolution/ it uses 5 steps 1. Open one of the shared sections from BaseNamedObjects mapped into explorer.exe address space, and w...
- Sat Mar 16, 2013 12:05 pm
- Forum: Problem Reports
- Topic: Sandboxie bypassed
- Replies: 91
- Views: 27542
- Sat Mar 16, 2013 9:44 am
- Forum: Problem Reports
- Topic: Sandboxie bypassed
- Replies: 91
- Views: 27542
- Sat Mar 16, 2013 6:53 am
- Forum: Problem Reports
- Topic: Sandboxie bypassed
- Replies: 91
- Views: 27542
- Thu Mar 14, 2013 6:56 pm
- Forum: Problem Reports
- Topic: Sandboxie bypassed
- Replies: 91
- Views: 27542
- Thu Mar 14, 2013 5:57 pm
- Forum: Problem Reports
- Topic: Sandboxie bypassed
- Replies: 91
- Views: 27542