StoneIce Posted August 18, 2015 Report Posted August 18, 2015 Hi and good morning everyone, This post is strictly for educational purposes and no harm intended. I really wanted to share experiences of late with Google Chrome and sandbox, making it impossible to inject any dll whatsoever into the process I removed sandbox and it sure did inject without further I dos. Now I see people going about talking about Sandbox and how it's almost impossible to inject chrome and even the source code I put on here proved abortive along the line. Contemplating using the code cave injection method, do you think it works? Just wanted to see experienced people with the same problems. No offence, just need to know as they say people in the dark don't see unless they have a lamp. Quote
Nytro Posted August 18, 2015 Report Posted August 18, 2015 As I explained you in PMs: sandbox have nothing to do with DLL injection.Wikipedia: https://en.wikipedia.org/wiki/Sandbox_(computer_security)You can inject a DLL using any method and do anything you want with your code. Your code will NOT run in the sandbox. Javascript for example runs in a sandbox. Quote
StoneIce Posted August 18, 2015 Author Report Posted August 18, 2015 @Nytro then I inject into chrome and I don't get to see the dll in process explorer? I did the same using several injection methods, it didn't even behave like there was a dll injected into the process, when I even checked I didn't see the dll in the process explorer. maybe you can check the dll injector I sent you to see things for yourself. I got confused along the line and that's why I have been asking questions even saw somewhere on cheat engine where someone had the same problem and the suggestion was to take away sandbox for testing. now that was where my heavyweight confusion started. Quote
Nytro Posted August 18, 2015 Report Posted August 18, 2015 (edited) You inject in only one process, as I said you in PMs:DWORD ID = GetProcessId("chrome.exe");This will find only last "chrome.exe" process. You will inject ONLY in that one. while(bRet) { if(!_stricmp(pe.szExeFile,szExeName)) { dwCount ; dwRet = pe.th32ProcessID;[COLOR=#ff0000][B] InjectDLL(dwRet,"C:\\Users\\Emi\\Documents\\Visual Studio 2012\\Projects\\iehookmdet\\Debug\\iehookmdet.dll")[/B][/COLOR] } bRet = Process32Next(hSnapshot, &pe); } Edited August 18, 2015 by Nytro Quote
StoneIce Posted August 18, 2015 Author Report Posted August 18, 2015 @Nytro, many thanks. lemme give it a shot now. Quote
NO-MERCY Posted August 18, 2015 Report Posted August 18, 2015 (edited) Take a look : Project Zero: In-Console-Ablehttps://bromiumlabs.files.wordpress.com/2013/07/application_sandboxes_a_pen_tester_s_perspective2.pdf Edited August 18, 2015 by NO-MERCY Quote