Search found 5 matches

by thantik
Tue Apr 14, 2009 12:25 pm
Forum: Feature Requests
Topic: Sandboxie Developer DLL or Launcher of some sort...
Replies: 2
Views: 2296

Sandboxie Developer DLL or Launcher of some sort...

Would it be possible to make a sandboxie dll distribution so that developers could sandbox their application to protect against any types of attacks such as privilege escalation, buffer overflows, etc? It would be amazing to provide a sandboxie dll loader, that loads your exe with certain options su...
by thantik
Mon Feb 16, 2009 8:26 pm
Forum: Contributed Utilities & Templates
Topic: Block Process Access
Replies: 211
Views: 213634

I get SBIE2313 - Could not execute SandboxieRpcSs.exe and SBIE2204 Cannot start sandboxed service RpcSs When trying to run windows explorer. Injtest returns the same values on sandboxed and nonsandboxed applications. Me personally, I am fine not being able to run explorer - I figure that's the first...
by thantik
Mon Feb 16, 2009 4:50 pm
Forum: Contributed Utilities & Templates
Topic: Block Process Access
Replies: 211
Views: 213634

W00t (I think.)

I ran injtest.exe against calc in sandbox with the new 1.0.0.5 version...and I got:

System-Wide process/thread snapshot handle:
0xFFFFFFFF

Data Read from process [4032]:
0x000000000000000000000000000000

Process module snapshot handle:
0xFFFFFFFF
by thantik
Mon Feb 16, 2009 3:33 pm
Forum: Contributed Utilities & Templates
Topic: Block Process Access
Replies: 211
Views: 213634

I'm getting similar results to what I posted before. Using the injtest.exe from within my sandbox, and specifying another sandboxed, as well as an unsandboxed calc.exe I'm taking a wild guess and thinking that when it says "Data Read from Process [xxx]:" that it should be all 0's or say that it coul...
by thantik
Mon Feb 16, 2009 5:12 am
Forum: Contributed Utilities & Templates
Topic: Block Process Access
Replies: 211
Views: 213634

I got similar results when running injtest.exe on both sandboxed, and unsandboxed programs.

(I am running injtest within the sandbox that's supposed to be blocking these calls)