SANDBOXIE HIGH TECH PROTECTION

Discussion in 'sandboxing & virtualization' started by EASTER, Feb 9, 2008.

Thread Status:
Not open for further replies.
  1. MitchE323

    MitchE323 Registered Member

    Joined:
    Nov 22, 2007
    Posts:
    156
  2. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,126
    Location:
    U.S.A. (South)
  3. SirMalware

    SirMalware Registered Member

    Joined:
    Jun 6, 2006
    Posts:
    133
    For those folks nervous about the possibility of malware leaks, Sandboxie also works well in an XP Limted Account.
     
  4. dmenace

    dmenace Registered Member

    Joined:
    Nov 29, 2006
    Posts:
    275
    A Sandboxie leaktest from zeroday software is on its way... ;)
     
  5. glentrino2duo

    glentrino2duo Registered Member

    Joined:
    May 8, 2006
    Posts:
    310
    exactly what I've been doing for quite some time now... :)
     
  6. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,126
    Location:
    U.S.A. (South)
    By all means bring it on. Theres no better way to strenghten such apps then complete and full scrutiny, it serves a very useful purpose for us all including the developers, so it's welcome indeed.

    Thanks dmenace.
     
  7. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,561
    Location:
    The Netherlands
    Well, the question for me is: does virtualization provide more/additional protection or not? Because basically, you can also sandbox certain processes with classical HIPS, that´s what I´ve done, certain tools that are vulnerable to drive by attacks are stripped from rights by SSM/NG + SRP (DropMyRights), so normally speaking, this measure should give malware a hard time to do any damage. The thing is, what if some attack completely bypasses these measures, I wonder, would virtualization (file/registry redirection) help me?

    I would really like to test these kind of scenarios, but it´s hard for me to find any exploited sites, and I´ve got problems with network connections on my VM´s, so I can´t even test in a safe way. But just a couple of days ago, I finally found an exploited site, and I was so excited that I ran it on my real machine. Yes I know, it´s not that smart. But anyway, it supposedly tried to exploit a Quicktime flaw and the plan was to install some rootkit. But I don´t think it succeeded, so something (SRP?) must have stopped it, I didn´t get any alerts from my HIPS though.
     
    Last edited: Feb 12, 2008
  8. twl845

    twl845 Registered Member

    Joined:
    Apr 12, 2005
    Posts:
    4,186
    Location:
    USA
    I finally installed Sandboxie and sandboxed my Firefox Browser. This is cool. :D
     
  9. Huupi

    Huupi Registered Member

    Joined:
    Sep 2, 2006
    Posts:
    2,024
    Agree,even MS will provide some kind of virtu in their upcoming 7. Sandboxing,virtu solutions are the way to go for now and the future.
     
  10. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    The big advantage with Sandboxie is not only protects, like running with lower rights, but allows you to completely delete what ever ran.

    As far as the registry, sanboxie, copies what it needs from the registry into the sandbox

    Pete
     
  11. twl845

    twl845 Registered Member

    Joined:
    Apr 12, 2005
    Posts:
    4,186
    Location:
    USA
    I think I read that it is normal for my Browser (Firefox) to load slow when I open it sandboxed the first time, and faster on subsequent load ups after that. It seems that it loads slower than normal every time though which is about 22 seconds, as opposed to 10 seconds on the initial load after boot up not sandboxed. If that's what I should expect I'm not concerned, just wondering.
     
  12. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,126
    Location:
    U.S.A. (South)
    @Peter2150

    If SandboxIE auto-drops admin rights (when sandboxed) is there any real advantage in your opinion to also run SuRun in combination? Seems to me would be redundant since SandboxIE already degresses those rights built into the program.

    Easter
     
  13. MikeNAS

    MikeNAS Registered Member

    Joined:
    Sep 28, 2006
    Posts:
    697
    Location:
    FiNLAND
    I haven't heard that Sandboxie lower programs rights. SuRun gives admin rights when user is in LUA that's a different thing (IMO).
     
  14. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,126
    Location:
    U.S.A. (South)
    Good enough then. It that holds true then my running SuRun with this configuration can only further tighten a more solid grip against forced potential interruptions or intrusions so i'll just keep things as they are for now.
     
  15. innerpeace

    innerpeace Registered Member

    Joined:
    Jan 15, 2007
    Posts:
    2,121
    Location:
    Mountaineer Country
    Hello Easter, I thought SuRun was only useful in being able to run a program that needs admin privileges when your running in a LUA.

    FWIW, Process Explorer reports admin privileges when running a program Sandboxed. When I use my custom shortcuts to start Sandboxie/DropMyRights/Firefox, it shows Firefox.exe, SandboxieRpcSs.exe and SandboxieDcomLaunch.exe as 'Deny,Owner' which should be running with limited rights as far as I know. As a side note, when I set Firefox as Run Safer within Online Armor and then run Firefox in Sandboxie, it does not show as 'Deny,Owner' in Process Explorer.

    Also, if you look in Sandbox Settings - Resource Access - Low Level Access, you see that Sandboxie limits in these areas. Warning, leave the 3 boxes unchecked unless you know what your doing.

    For the tests, are you running as an LUA or Admin? Also, what changes to your configuration have you made? Have you thought about testing with a default Sandboxie config and your modified one? I think it would be interesting to see if a default and a modified config ended up with similar results.

    Cheers,
    innerpeace

    Edit: I see MikeNAS posted about SuRun also.
     
    Last edited: Feb 13, 2008
  16. aigle

    aigle Registered Member

    Joined:
    Dec 14, 2005
    Posts:
    11,164
    Location:
    UK / Pakistan
    Hi, Sandboxie leaktest or Sandbox leak test?

    Thanks
     
  17. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,126
    Location:
    U.S.A. (South)
    Neither yet, i'm examining closely which settings would offer the best protections allowable by SandboxIE. This is as exciting for me as HIPS, the protection coverages offered are sure to prove impenetratable and if i add my DEEP FREEZE all bets are off for malware, they have lost.
     
  18. innerpeace

    innerpeace Registered Member

    Joined:
    Jan 15, 2007
    Posts:
    2,121
    Location:
    Mountaineer Country
    Thanks for your reply EASTER. I agree that sandbox programs are exciting technologies and it does feel good to be ahead of the bad guys for a change with running a sandbox, HIPS and Virtualization program :thumb:. I look forward to hearing more about the tests.
     
  19. dmenace

    dmenace Registered Member

    Joined:
    Nov 29, 2006
    Posts:
    275
    Sandbox leaktest aimed primarily at Sandboxie. (Ie may also work with others, not based around specific vulnerabilities)

    Currently not ready for release still needs more work... Sandboxie is VERY good, kernel hooks blocked, so is SDT restore, etc. Won't go into detail.

    But basically what i discovered when creating this test is even if sandbox is bypassed a well written HIPS and firewall, part of a multilayered solution will continue to protect you.
     
  20. Huupi

    Huupi Registered Member

    Joined:
    Sep 2, 2006
    Posts:
    2,024
    Installed PD 2008 in SB without a hitch so proof that all registry needed and even their propiate driver and services are sandboxed,this is against some comments that its not possible.

    This was with default configuration,so most with closedpath config.
     
  21. Huupi

    Huupi Registered Member

    Joined:
    Sep 2, 2006
    Posts:
    2,024
    Returnil and SBIE make for a a simple and almost 100 % protection[ for sure how to configure,still learning] and feel more confident to ditch all realtime AV.
    Benefit : lesser conflicts and everything faster !!
     
  22. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,126
    Location:
    U.S.A. (South)
    Thats no surprise. Serious security devlopers have grown equally notoroius against compromise makers and in many ways have trumped and learned much better how to frustrate their designs.

    SandboxIE as others are a force to be reckond with and most formidable POWER SHIELD, make no bones about it.
     
  23. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    Sandboxie doesn't drop rights, it strictly runs sandboxed. I do also run my browsers, and email client with lower rights, and to a degree it is redundant. But there are a few things that don't work that well in the sandbox, and the lower rights cover those.

    Pete
     
  24. aigle

    aigle Registered Member

    Joined:
    Dec 14, 2005
    Posts:
    11,164
    Location:
    UK / Pakistan
    Like what?
     
  25. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,561
    Location:
    The Netherlands
    Yes I know, but SBIE´s won´t actually block exploits from running inside the sandbox. So when you run into a site serving malware, a malicious BHO (for example) might be installed. The advantage is that you´re real system will never get infected. But a HIPS like SSM is actually able to stop the code execution. Of course this might be bypassed by some advanced exploit, but same goes for file/registry redirection (virtualization), I guess.

    What I´m trying to say is that in fact SBIE is not that different from regular HIPS (with sandboxing capabilities) but it offers virtualization as an extra, just like SafeSpace. I suppose that this might have certain advantages when dealing with certain advanced attacks, with that I mean, even if you will get hit, the malware is still contained in the sandbox.
     
    Last edited: Feb 13, 2008
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.