Blackhat attack / how does Rehips stop them

Started by whitewaterbug, September 12, 2023, 04:57:44 PM

Previous topic - Next topic


The idea is just run a keylogger inside the container. 

I just found rehips and I am not yet oriented.  If there is a technical architecture document that describes the set of likely sandbox escape and sandbox attack defenses then please point me to this kind of document(s).


There are several useful blogposts covering basics, internals and other useful topics. They're all in this post I'm sure you'll find a lot of useful stuff there.

When ReHIPS was created, we kept in mind desktop attacks and similar stuff, so it should provide solid protection against them.