{"id":9865,"date":"2013-03-15T10:53:06","date_gmt":"2013-03-15T09:53:06","guid":{"rendered":"https:\/\/www.corelan.be\/?p=9865"},"modified":"2013-03-15T10:53:06","modified_gmt":"2013-03-15T09:53:06","slug":"blackhateu2013-day2-the-sandbox-roulette-are-you-ready-to-ramble","status":"publish","type":"post","link":"https:\/\/www.corelan.be\/index.php\/2013\/03\/15\/blackhateu2013-day2-the-sandbox-roulette-are-you-ready-to-ramble\/","title":{"rendered":"BlackHatEU2013 - Day2 - The Sandbox Roulette: Are you ready to ramble"},"content":{"rendered":"<p>Good morning friends,<\/p>\n<p>I'd like to welcome you back on this second day of BlackHat Europe 2013. \u00a0Day 1 has been pretty interesting, so let's see how day 2 goes (especially after Rapid7 and IOActive parties last night). \u00a0I think there is no better way of starting the second day at a conference with - say - some hardcore technical stuff about sandboxes. \u00a0This must be my luck day because that is exactly what\u00a0<a href=\"http:\/\/www.blackhat.com\/eu-13\/briefings.html#Wojtczuk\">Rafal Wojtczuk and Rahul Kashyap<\/a>, from Bromium,\u00a0will be covering in their talk.<\/p>\n<h3>What is a sandbox ?<\/h3>\n<p>A sandbox is an environment designed to run untrusted (or exploitable) code, in a manner that prevents the encapsulated code from damaging the rest of the system, Rahul explains. \u00a0In this talk, he continues, the researchers will present their findings on various sandbox implementations in Windows, from an architecture point of view. \u00a0The focus for this talk is not about sandbox escape exploit code, but rather show generic approaches to escaping from \u00a0specific types of sandbox (by, for example, using kernel bugs that can be triggered from within the sandboxed process)<\/p>\n<p>For the sake of the talk, they have divided sandboxes into 2 types:<\/p>\n<ul>\n<li>Type 1 : OS enhancement based (Sandboxie, Buffer Zone Pro, etc)<\/li>\n<li>Type 2 : Master-slave model (Adobe Reader X, Google Chrome Browser).<\/li>\n<\/ul>\n<p>Rahul explains that some applications have quite some significant interaction with the kernel, which is why they focused on this area.<\/p>\n<h3>Some facts:<\/h3>\n<p>Current OSs are large, complex and exploitable. \u00a0In 2012 alone, there are 12 CVE entries for kernel related issues. \u00a0In Feb of 2013, there were 30 CVE entries for win32k.sys. \u00a0 The question is: to what degree does a sandbox limit the exposure the kernel to exploitation ? \u00a0(think \"Duqu\").<\/p>\n<h3>How does a sandbox work ?<\/h3>\n<p>Sandboxed app: \"Dear kernel, please open a file for me, the file name is at this address X\". \u00a0Kernel checks if app is allowed to access the file and informs the app. \u00a0If there is a bug in the sandbox routine, the kernel could corrupt its own memory, allowing for the injection and execution of arbitrary code in the kernel.<\/p>\n<h3>Type 2 : OS enhancement based Sandbox<\/h3>\n<p>(Sandboxie is used as the example)<\/p>\n<p>Sandboxie is a custom kernel driver which modifies Windows behaviour to protect certain system components. \u00a0The sandbox has direct access to all OS functionality, which means almost all kernel vulnerabilities can be exploitable from within the sandbox. \u00a0The sandbox won't be able to contain the malicious code because everything runs with the kernel.<\/p>\n<h4>Bypassing Sandboxie<\/h4>\n<p>Example : CVE-2012-0217 (MS12-042): This User Mode Scheduler Memory bug allows you to run arbitrary code in kernel mode. \u00a0In this particular case, when running in sandboxie container, the usual SYSTEM-token-steal shellcode is not sufficient to break out of the sandbox. \u00a0The exploit needs to use the \"unlimited\" power of the kernel to disable the sandbox driver or just migrate into another process (which runs outside of the sandboxie protection) so the shell code would run outside of the container, Rafal explains, and then moves on to demonstrating the exploit on an (unpatched) Windows 7 machine.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"20130315_101805.jpg.jpeg\" alt=\"20130315 101805 jpg\" src=\"https:\/\/www.corelan.be\/wp-content\/uploads\/2013\/03\/20130315_101805.jpg.jpeg\" width=\"600\" height=\"450\" border=\"0\" \/><\/p>\n<h4>Bypassing Buffer Zone Pro<\/h4>\n<p>The approach is quite similar to Sandboxie, but BufferZone Pro also attempts to prevent data theft. \u00a0Rafal demonstrates that the same exploit (sysret.exe) as the one used in the demo for Sandboxie works for BufferZone as well. \u00a0In other words, a kernel bug is used to get code to run in the kernel (from inside the sandboxed cmd.exe process). \u00a0Once you have kernel privileges, you have enough power to break out of the BufferZone sandbox.<\/p>\n<h3>Type 2: Master\/Slave type sandboxes<\/h3>\n<p>This type of sandboxes have 2 processes, a master and slave, which use some kind of IPC to communicate. \u00a0The slave process capabilities are limited by what the master defines. \u00a0For OS-based confinement, Rahul says, there is no protection for mounted FAT or FAT32 volumes, no protection for TCP\/IP. \u00a0Access to most existing securable resources will be denied though.<\/p>\n<p>To break out of this sandbox, you'll need to attack the master. \u00a0The question is, how resistant is the master to a malicious slave, which runs with low integrity (Adobe) or \"untrusted\" (Chrome). \u00a0A recent exploit found in the wild, which breaks the Adobe Reader sandbox, shows that it is in fact possible to attack the master from he slave, using the IPC communication, but using a bug in the master. \u00a0The reality is that in general, this is quite complex to do and often requires a chain of exploits to be successfull. \u00a0Rahul mentions that, In Chrome, access to a FAT32 filesystem is denied.<\/p>\n<p>How about attacking the kernel directly from the slave? \u00a0Rahul states that win32k.sys is still exposed to the slave process, so this might be a viable attack vector to break out of type2 sandboxes.<\/p>\n<h4>Bypassing the Chrome browser sandbox<\/h4>\n<p>MS12-075 \/ CVE-2012-2897 will be used to demonstrate how it would be possible to break out of the Chrome sandbox. Since the bug is based on a TTF Font Parsing Vulnerability, all you need to do to trigger the bug is visit a specifically crafted webpage. \u00a0 Rafal says that the chances of achieving kernel code execution is much better if you can run code in the slave process first.<\/p>\n<h4>Bypassing Adobe Reader X<\/h4>\n<p>The approach here is very similar. Using a kernel bug (MS11-087), and the ability to run code inside the slave (renderer) process, the researchers were able to break out of the sandbox and get system permissions on the machine. \u00a0During the demonstration, they triggered a reader bug (allowing code to run in the slave\u2026 which is still sandboxed), injected code into the slave, which uses a kernel bug to break out of the sandbox.<\/p>\n<p>Rafal continues by demonstrating that the same kernel bug can be used to break to of the Chrome sandbox as well. As soon as you can execute\/inject arbitrary code in the slave process, you could try to break out of the sandbox by attacking the kernel, and not the master process.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" title=\"20130315_104301.jpg.jpeg\" alt=\"20130315 104301 jpg\" src=\"https:\/\/www.corelan.be\/wp-content\/uploads\/2013\/03\/20130315_104301.jpg.jpeg\" width=\"600\" height=\"450\" border=\"0\" \/><\/p>\n<p>&nbsp;<\/p>\n<h3>Conclusion<\/h3>\n<ul>\n<li>Many Windows kernel vulnerabilities have been discovered and can be used to leverage sandbox escapes, if you can trigger the bug from the sandboxed process. \u00a0One of the exploits used at pwn2own last week uses a kernel bug to break out of the sandbox, so this is still a viable attack vector.<\/li>\n<li>Virtualization based sandboxing might offer additional protection, because the entire OS is wrapped into a sandbox. \u00a0OS vulnerabilities will be nonfatal, but you need a special hypervisor (which can be a target by itself).<\/li>\n<li>SMEP may not solve the issue, as it focuses on exploitation and not preventing bugs.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Good morning friends, I'd like to welcome you back on this second day of BlackHat Europe 2013. \u00a0Day 1 has been pretty interesting, so let's see how day 2 goes (especially after Rapid7 and IOActive parties last night). \u00a0I think there is no better way of starting the second day at a conference with - &hellip; <a href=\"https:\/\/www.corelan.be\/index.php\/2013\/03\/15\/blackhateu2013-day2-the-sandbox-roulette-are-you-ready-to-ramble\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> \"BlackHatEU2013 - Day2 - The Sandbox Roulette: Are you ready to ramble\"<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[2250,1],"tags":[2761,2681,1991],"class_list":["post-9865","post","type-post","status-publish","format-standard","hentry","category-cons-seminars","category-uncategorized","tag-sandbox","tag-blackhat","tag-fuzzing"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>BlackHatEU2013 - Day2 - The Sandbox Roulette: Are you ready to ramble - Corelan | Exploit Development &amp; Vulnerability Research<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.corelan.be\/index.php\/2013\/03\/15\/blackhateu2013-day2-the-sandbox-roulette-are-you-ready-to-ramble\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"BlackHatEU2013 - Day2 - The Sandbox Roulette: Are you ready to ramble - Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"og:description\" content=\"Good morning friends, I&#039;d like to welcome you back on this second day of BlackHat Europe 2013. \u00a0Day 1 has been pretty interesting, so let&#039;s see how day 2 goes (especially after Rapid7 and IOActive parties last night). \u00a0I think there is no better way of starting the second day at a conference with - &hellip; Continue reading &quot;BlackHatEU2013 - Day2 - The Sandbox Roulette: Are you ready to ramble&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.corelan.be\/index.php\/2013\/03\/15\/blackhateu2013-day2-the-sandbox-roulette-are-you-ready-to-ramble\/\" \/>\n<meta property=\"og:site_name\" content=\"Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corelanconsulting\" \/>\n<meta property=\"article:published_time\" content=\"2013-03-15T09:53:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.corelan.be\/wp-content\/uploads\/2013\/03\/20130315_101805.jpg.jpeg\" \/>\n<meta name=\"author\" content=\"corelanc0d3r\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@corelanc0d3r\" \/>\n<meta name=\"twitter:site\" content=\"@corelanc0d3r\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2013\\\/03\\\/15\\\/blackhateu2013-day2-the-sandbox-roulette-are-you-ready-to-ramble\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2013\\\/03\\\/15\\\/blackhateu2013-day2-the-sandbox-roulette-are-you-ready-to-ramble\\\/\"},\"author\":{\"name\":\"corelanc0d3r\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\"},\"headline\":\"BlackHatEU2013 - Day2 - The Sandbox Roulette: Are you ready to ramble\",\"datePublished\":\"2013-03-15T09:53:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2013\\\/03\\\/15\\\/blackhateu2013-day2-the-sandbox-roulette-are-you-ready-to-ramble\\\/\"},\"wordCount\":1119,\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2013\\\/03\\\/15\\\/blackhateu2013-day2-the-sandbox-roulette-are-you-ready-to-ramble\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2013\\\/03\\\/20130315_101805.jpg.jpeg\",\"keywords\":[\"sandbox\",\"blackhat\",\"fuzzing\"],\"articleSection\":[\"Cons and Seminars\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2013\\\/03\\\/15\\\/blackhateu2013-day2-the-sandbox-roulette-are-you-ready-to-ramble\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2013\\\/03\\\/15\\\/blackhateu2013-day2-the-sandbox-roulette-are-you-ready-to-ramble\\\/\",\"name\":\"BlackHatEU2013 - Day2 - The Sandbox Roulette: Are you ready to ramble - Corelan | Exploit Development &amp; Vulnerability Research\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2013\\\/03\\\/15\\\/blackhateu2013-day2-the-sandbox-roulette-are-you-ready-to-ramble\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2013\\\/03\\\/15\\\/blackhateu2013-day2-the-sandbox-roulette-are-you-ready-to-ramble\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2013\\\/03\\\/20130315_101805.jpg.jpeg\",\"datePublished\":\"2013-03-15T09:53:06+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2013\\\/03\\\/15\\\/blackhateu2013-day2-the-sandbox-roulette-are-you-ready-to-ramble\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2013\\\/03\\\/15\\\/blackhateu2013-day2-the-sandbox-roulette-are-you-ready-to-ramble\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2013\\\/03\\\/15\\\/blackhateu2013-day2-the-sandbox-roulette-are-you-ready-to-ramble\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2013\\\/03\\\/20130315_101805.jpg.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2013\\\/03\\\/20130315_101805.jpg.jpeg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2013\\\/03\\\/15\\\/blackhateu2013-day2-the-sandbox-roulette-are-you-ready-to-ramble\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.corelan.be\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"BlackHatEU2013 &#8211; Day2 &#8211; The Sandbox Roulette: Are you ready to ramble\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"name\":\"Corelan CyberSecurity Research\",\"description\":\"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.corelan.be\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\",\"name\":\"Corelan CyberSecurity Research\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"contentUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"width\":200,\"height\":200,\"caption\":\"Corelan CyberSecurity Research\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corelanconsulting\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\",\"https:\\\/\\\/x.com\\\/corelanconsulting\",\"https:\\\/\\\/instagram.com\\\/corelanconsult\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\",\"name\":\"corelanc0d3r\",\"pronouns\":\"he\\\/him\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"caption\":\"corelanc0d3r\"},\"description\":\"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.\",\"sameAs\":[\"https:\\\/\\\/www.corelan-training.com\",\"https:\\\/\\\/instagram.com\\\/corelanc0d3r\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/petervaneeckhoutte\\\/\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\"],\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/author\\\/admin0\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"BlackHatEU2013 - Day2 - The Sandbox Roulette: Are you ready to ramble - Corelan | Exploit Development &amp; Vulnerability Research","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.corelan.be\/index.php\/2013\/03\/15\/blackhateu2013-day2-the-sandbox-roulette-are-you-ready-to-ramble\/","og_locale":"en_US","og_type":"article","og_title":"BlackHatEU2013 - Day2 - The Sandbox Roulette: Are you ready to ramble - Corelan | Exploit Development &amp; Vulnerability Research","og_description":"Good morning friends, I'd like to welcome you back on this second day of BlackHat Europe 2013. \u00a0Day 1 has been pretty interesting, so let's see how day 2 goes (especially after Rapid7 and IOActive parties last night). \u00a0I think there is no better way of starting the second day at a conference with - &hellip; Continue reading \"BlackHatEU2013 - Day2 - The Sandbox Roulette: Are you ready to ramble\"","og_url":"https:\/\/www.corelan.be\/index.php\/2013\/03\/15\/blackhateu2013-day2-the-sandbox-roulette-are-you-ready-to-ramble\/","og_site_name":"Corelan | Exploit Development &amp; Vulnerability Research","article_publisher":"https:\/\/www.facebook.com\/corelanconsulting","article_published_time":"2013-03-15T09:53:06+00:00","og_image":[{"url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2013\/03\/20130315_101805.jpg.jpeg","type":"","width":"","height":""}],"author":"corelanc0d3r","twitter_card":"summary_large_image","twitter_creator":"@corelanc0d3r","twitter_site":"@corelanc0d3r","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/www.corelan.be\/index.php\/2013\/03\/15\/blackhateu2013-day2-the-sandbox-roulette-are-you-ready-to-ramble\/#article","isPartOf":{"@id":"https:\/\/www.corelan.be\/index.php\/2013\/03\/15\/blackhateu2013-day2-the-sandbox-roulette-are-you-ready-to-ramble\/"},"author":{"name":"corelanc0d3r","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f"},"headline":"BlackHatEU2013 - Day2 - The Sandbox Roulette: Are you ready to ramble","datePublished":"2013-03-15T09:53:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.corelan.be\/index.php\/2013\/03\/15\/blackhateu2013-day2-the-sandbox-roulette-are-you-ready-to-ramble\/"},"wordCount":1119,"publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"image":{"@id":"https:\/\/www.corelan.be\/index.php\/2013\/03\/15\/blackhateu2013-day2-the-sandbox-roulette-are-you-ready-to-ramble\/#primaryimage"},"thumbnailUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2013\/03\/20130315_101805.jpg.jpeg","keywords":["sandbox","blackhat","fuzzing"],"articleSection":["Cons and Seminars"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.corelan.be\/index.php\/2013\/03\/15\/blackhateu2013-day2-the-sandbox-roulette-are-you-ready-to-ramble\/","url":"https:\/\/www.corelan.be\/index.php\/2013\/03\/15\/blackhateu2013-day2-the-sandbox-roulette-are-you-ready-to-ramble\/","name":"BlackHatEU2013 - Day2 - The Sandbox Roulette: Are you ready to ramble - Corelan | Exploit Development &amp; Vulnerability Research","isPartOf":{"@id":"https:\/\/www.corelan.be\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.corelan.be\/index.php\/2013\/03\/15\/blackhateu2013-day2-the-sandbox-roulette-are-you-ready-to-ramble\/#primaryimage"},"image":{"@id":"https:\/\/www.corelan.be\/index.php\/2013\/03\/15\/blackhateu2013-day2-the-sandbox-roulette-are-you-ready-to-ramble\/#primaryimage"},"thumbnailUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2013\/03\/20130315_101805.jpg.jpeg","datePublished":"2013-03-15T09:53:06+00:00","breadcrumb":{"@id":"https:\/\/www.corelan.be\/index.php\/2013\/03\/15\/blackhateu2013-day2-the-sandbox-roulette-are-you-ready-to-ramble\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.corelan.be\/index.php\/2013\/03\/15\/blackhateu2013-day2-the-sandbox-roulette-are-you-ready-to-ramble\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.corelan.be\/index.php\/2013\/03\/15\/blackhateu2013-day2-the-sandbox-roulette-are-you-ready-to-ramble\/#primaryimage","url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2013\/03\/20130315_101805.jpg.jpeg","contentUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2013\/03\/20130315_101805.jpg.jpeg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.corelan.be\/index.php\/2013\/03\/15\/blackhateu2013-day2-the-sandbox-roulette-are-you-ready-to-ramble\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.corelan.be\/"},{"@type":"ListItem","position":2,"name":"BlackHatEU2013 &#8211; Day2 &#8211; The Sandbox Roulette: Are you ready to ramble"}]},{"@type":"WebSite","@id":"https:\/\/www.corelan.be\/#website","url":"https:\/\/www.corelan.be\/","name":"Corelan CyberSecurity Research","description":"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.","publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.corelan.be\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.corelan.be\/#organization","name":"Corelan CyberSecurity Research","url":"https:\/\/www.corelan.be\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/","url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","contentUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","width":200,"height":200,"caption":"Corelan CyberSecurity Research"},"image":{"@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corelanconsulting","https:\/\/x.com\/corelanc0d3r","https:\/\/x.com\/corelanconsulting","https:\/\/instagram.com\/corelanconsult"]},{"@type":"Person","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f","name":"corelanc0d3r","pronouns":"he\/him","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","url":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","caption":"corelanc0d3r"},"description":"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.","sameAs":["https:\/\/www.corelan-training.com","https:\/\/instagram.com\/corelanc0d3r","https:\/\/www.linkedin.com\/in\/petervaneeckhoutte\/","https:\/\/x.com\/corelanc0d3r"],"url":"https:\/\/www.corelan.be\/index.php\/author\/admin0\/"}]}},"views":3624,"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/9865","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/comments?post=9865"}],"version-history":[{"count":0,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/9865\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/media?parent=9865"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/categories?post=9865"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/tags?post=9865"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}