Whats your opinion on Sandboxie

Discussion in 'sandboxing & virtualization' started by Frog01, Dec 21, 2008.

Thread Status:
Not open for further replies.
  1. Franklin

    Franklin Registered Member

    Joined:
    May 12, 2005
    Posts:
    2,517
    Location:
    West Aussie
    Not really comparable but maybe you could try Comodo's Disk Shield Beta.

    Running it here along with Sandboxie on my XP 64 bit install and seems to work OK but I don't really know too much about it as I prefer using my 32 bit installs most of the time.
     
  2. Robin A.

    Robin A. Registered Member

    Joined:
    Feb 25, 2006
    Posts:
    2,557
    I understand that SBIE sandboxes some parts of the system partition, but not all of it. My question is if SDBIE protects in the following case (it happened to me recently):

    I download a file with uTorrent or Internet Download Manager. The downloaded file is saved to a folder in a data partition (not in the C: partition).

    When I open the file, the antivirus (avast!) immediately detects malware. I quarantine the file, but the antivirus keeps issuing alarms. It becomes clear that malware has infected not one but several locations on the system partition, it has even installed a program that keeps reporting security problems from the icon tray.

    If I delete the sandbox, is all the malware written to C: deleted? Is the downloaded file deleted?
     
  3. trjam

    trjam Registered Member

    Joined:
    Aug 18, 2006
    Posts:
    9,102
    Location:
    North Carolina USA
    that has always been my issue. If your AV detects something while Sandbox and quarantines it. It is still there after closing Sandbox, now you restore and guess what.
     
  4. PiCo

    PiCo Registered Member

    Joined:
    Apr 9, 2008
    Posts:
    352
    Location:
    Athens, Greece
    If you run the malware within the Sandbox, play with it a little and then delete the Sandbox, all contents of the Sandbox will be deleted and NONE changes will have been made to ANY location.
     
  5. chris2busy

    chris2busy Registered Member

    Joined:
    Jun 14, 2007
    Posts:
    477
    and why restore an infected file? (and av will alarm again during recovery bcz it is copied/written on system
     
  6. iceni60

    iceni60 ( ^o^)

    Joined:
    Jun 29, 2004
    Posts:
    5,116
    i've used it on my vista laptop, but only a few times, it's seems really good. i even listened to the security now about it the other day with the developer.
    http://www.grc.com/sn/sn-172.htm
     
  7. trjam

    trjam Registered Member

    Joined:
    Aug 18, 2006
    Posts:
    9,102
    Location:
    North Carolina USA
    well what if we thought it was a FP. And no, files like this are not deleted by closing SB. I know the chances are rare but that is why we are called human beings.o_O
     
  8. chris2busy

    chris2busy Registered Member

    Joined:
    Jun 14, 2007
    Posts:
    477
    well if it was an alarm,false or not it is still a matter of you and your av as to what to do with it.sbie fails in neither case and also gives you multiple security patterns on hoq to wipe the sandbox data (you can also select "explore contents" and delete just the problematic file anyways from within sbie,no need to shut it)
     
  9. kwismer

    kwismer Registered Member

    Joined:
    Jan 4, 2008
    Posts:
    240
    of course that only stops keyloggers from using their own communications channel... ones that use the browser will still be able to leak your data...

    also, in-browser malware and drive-by pharming are not stopped by sandboxie, but otherwise it is a pretty good tool...
     
  10. Peter2150

    Peter2150 Global Moderator

    Joined:
    Sep 20, 2003
    Posts:
    20,590
    What difference does it make if the keylogger can use your browser. Can it do that if it can't be installed?
     
  11. Doodler

    Doodler Registered Member

    Joined:
    Dec 23, 2007
    Posts:
    237
    Can you clarify?
     
  12. dw426

    dw426 Registered Member

    Joined:
    Jan 3, 2007
    Posts:
    5,543
    Exactly, keyloggers have to execute, and if only the .exe for the browser is permitted to run inside the sandbox and is the only .exe allowed internet access, the keylogger is DOA. Also, malware may not be stopped from getting in the sandbox, but malware can't do a thing that can't be reversed once it's in there. One thing you do have right is there is no phishing (which I believe you meant instead of pharming) protection. If you willingly hand information over, nothing can stop you.
     
  13. Dark Shadow

    Dark Shadow Registered Member

    Joined:
    Oct 11, 2007
    Posts:
    4,553
    Location:
    USA
    Key logger simulation test with Sandboxie restrictions as followed Firefox internet Access only +start/run Access = Firefox.Exe only No other Excuteable.The following of the four.
     

    Attached Files:

  14. Dark Shadow

    Dark Shadow Registered Member

    Joined:
    Oct 11, 2007
    Posts:
    4,553
    Location:
    USA
    Test 2
     

    Attached Files:

  15. Dark Shadow

    Dark Shadow Registered Member

    Joined:
    Oct 11, 2007
    Posts:
    4,553
    Location:
    USA
    Test 3
     

    Attached Files:

  16. Dark Shadow

    Dark Shadow Registered Member

    Joined:
    Oct 11, 2007
    Posts:
    4,553
    Location:
    USA
    Test 4 It looks like a key logger would fail IMO. Draw your own conclusions.
     

    Attached Files:

  17. Montecristo

    Montecristo Registered Member

    Joined:
    Dec 23, 2008
    Posts:
    72
    Sandboxie is a great program.

    Thanks for the screenshots djohn.
     
  18. Dark Shadow

    Dark Shadow Registered Member

    Joined:
    Oct 11, 2007
    Posts:
    4,553
    Location:
    USA
    Your welcome
     
  19. nick s

    nick s Registered Member

    Joined:
    Nov 20, 2002
    Posts:
    1,430
    It seems to me that a less contentious approach would be to exclude \Sandbox from AV interference. The sandbox contents are virtualized until explicitly made otherwise...at which point I would expect a resident AV to react to file writes or execution.

    Nick
     
  20. Dark Shadow

    Dark Shadow Registered Member

    Joined:
    Oct 11, 2007
    Posts:
    4,553
    Location:
    USA
    I am not sure what you mean by interference but in this particular test nod32 fails,Hense there is No interference.
     
  21. nick s

    nick s Registered Member

    Joined:
    Nov 20, 2002
    Posts:
    1,430
    Sorry about the confusion. I was not responding to your posts. I was just making a general point about sandbox and AV interaction.

    Nick
     
  22. Dark Shadow

    Dark Shadow Registered Member

    Joined:
    Oct 11, 2007
    Posts:
    4,553
    Location:
    USA
    OK sorry my bad.
     
  23. waters

    waters Registered Member

    Joined:
    Nov 8, 2004
    Posts:
    958
    I would like to try Sandboxie but would it work with bittorrent.I need utorrent to be able to send correct ratio to the private tracker.How could it be set up not to affect stats
     
  24. Rmus

    Rmus Exploit Analyst

    Joined:
    Mar 16, 2005
    Posts:
    4,020
    Location:
    California
    kwismer may also be referring to an XSS script injection, or code embedded in a page the user reaches through pharming:

    Once the user finishes typing and clicks "submit" or "login," all keystrokes are sent to the hacker's site. No separate keylogger executable needed.

    ----
    rich
     
  25. HURST

    HURST Registered Member

    Joined:
    Jul 20, 2007
    Posts:
    1,419
    There is no protection against that, just common sense (which I'm beginning to doubt it even exists)

    NoScript could help also, but that is for another thread...
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.