pwn.college
DojosLeaderboardCommunity
LoginRegister
Back to system-security

Sandboxing

system-security
0/18 challenges completed

Computer security sandboxing refers to a technique used to isolate potentially malicious code or untrusted programs, ensuring they run in a confined environment where they cannot cause harm to the broader system. By creating a 'sandbox' or restricted space for these programs to operate in, any malicious actions are confined to this isolated area, preventing potential damage to the host system or access to sensitive data. This module explores sandboxing techniques as well as how hackers can escape a misconfigured sandbox.

Note, levels 14+ of the sandboxing challenges must be ran inside a virtual machine. This virtual machine can be launched using the vm connect command while at a terminal.

Sandboxing: Introduction
Video
Slides
Tips, Tricks, and Further Reading

Filesystem Sandboxing

Sandboxing: chroot
Video
Slides
1
chroot-escape-basic
2
chroot-shellcode
3
chroot-proper

System Call Sandboxing

Sandboxing: seccomp
Video
Slides
Sandboxing: Escaping seccomp
Video
Slides
4
seccomp-basic
5
seccomp-linkat
6
seccomp-fchdir
7
seccomp-rechroot
8
seccomp-only
9
seccomp-arch32
10
seccomp-minimal
11
seccomp-timebased
12
seccomp-readonly
13
process-isolation

Sandboxing via Namespaces

Sandboxing: Namespacing Live Sesssion 1
Video
Sandboxing: Namespacing Live Sesssion 2
Video
14
mount-namespace
15
mount-cleanup
16
mount-readonly
17
mount-shellcode
18
mount-bindmount