3 Year Old Exploit Still Works against Avast Sandbox

Discussion in 'other anti-virus software' started by AutoCascade, Jan 20, 2016.

  1. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
  2. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    Has he already put SBIE to the test?
     
  3. AutoCascade

    AutoCascade Registered Member

    Joined:
    Feb 16, 2014
    Posts:
    741
    Location:
    United States
    I haven't asked but if he had it'd probably be in his twitter feed which I follow and I haven't seen anything.
     
  4. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    Perhaps you can contact him again.
     
  5. AutoCascade

    AutoCascade Registered Member

    Joined:
    Feb 16, 2014
    Posts:
    741
    Location:
    United States
    Right now he's still deep in embarrassing Comodo products once I see that over I tweet again about sandboxie - send him a download link.

    Tavis Ormandy ‏@taviso 11h11 hours ago
    Having trouble encoding into language how colossal this Comodo screw-up is for my latest report. *facepalm* is not even close. #sigh

    Tavis Ormandy ‏@taviso Feb 24
    Lots of memory corruption in Comodo Antivirus. Many hilarious fails in their emulator. And of course, no ASLR and running as SYSTEM. #sigh

    Tavis Ormandy ‏@taviso Feb 18
    Comodo Internet Security installs a VNC server with predictable password by default. https://code.google.com/p/google-security-research/issues/detail?id=703… ¯\_(ツ)_/¯

    597 retweets303 likes
     
  6. liba

    liba Registered Member

    Joined:
    Jan 21, 2016
    Posts:
    344
    https://vazermind.wordpress.com/2013/01/04/c-bypass-sandboxiesunbeltsb-sandboxvmware-by-modules/

    [C++] Bypass (SandBoxie,SunBelt,SB SandBox,VMWARE) by Modules

    SbieDll.dll => To Bypass SandBoxie

    api_log.dll => To Bypass SunBelt

    dir_watch.dll => To Bypass SunBelt SandBox

    dbghelp.dll => To Bypass vmware

    this is the little source code:

    char* sModules[] = { “SbieDll.dll”, “api_log.dll”, “dir_watch.dll”, “dbghelp.dll”};//define module names

    bool ModuleCheck() //Return TRUE/FALSE .
    {
    for( int i = 0; i < ( sizeof( sModules ) / sizeof( char* ) ); i++ ) //for looping to get the module handle .
    {
    if( GetModuleHandle( sModules[ i ] ) ) //getting module handle.
    {
    return TRUE;//if exists return TRUE .
    }
    }
    return FALSE;//if not return FALSE.
    }

     
  7. AutoCascade

    AutoCascade Registered Member

    Joined:
    Feb 16, 2014
    Posts:
    741
    Location:
    United States
    Thats two years old, Sandboxie hasn't patched for that in the two years since?

     
  8. liba

    liba Registered Member

    Joined:
    Jan 21, 2016
    Posts:
    344
    yes.
     
  9. ance

    ance formerly: fmon

    Joined:
    May 5, 2013
    Posts:
    1,359
    Is this thread about Avast sandbox, Sandboxie or is it just an offtopic thread? o_O
     
  10. Amanda

    Amanda Registered Member

    Joined:
    Aug 8, 2013
    Posts:
    2,115
    Location:
    Brasil
    Does this exploit still works?
     
  11. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
  12. Brummelchen

    Brummelchen Registered Member

    Joined:
    Jan 3, 2009
    Posts:
    5,933
  13. CHEFKOCH

    CHEFKOCH Registered Member

    Joined:
    Aug 29, 2014
    Posts:
    395
    Location:
    Swiss
    Fixed in all products. If you execute example code then app crash immediately. Since there is no full source leaked it's unclear if that ever worked. SbieDll.dll was also changed from 2013 -> 2016 several times in meantime, same as api_log and dbghelp.

    There are other anti-anti vm exploits which working and full source are leaked, but can't post over here because it's on illegal forums for $.

    But I can give an example to detect Comodo sandbox (which still works) the easy way. The rest is dll injection in memory, I can't post here....
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.