Need Webroot developer volunteer for Sandboxie compatibility

  • 13 November 2013
  • 3 replies
  • 39 views

Userlevel 7
Badge +6
If any Webroot developer/engineer is interested in assisting me in developing a Sandboxie template to allow WSA filtering/identity shield/password vault to operate in sandboxed browsers please send me a PM. We will be building something like what is below, a sample of the Kaspersky template.
 
[Template_Kaspersky]
Tmpl.Title=Kaspersky Anti-Virus/Internet Security
Tmpl.Class=Security
Tmpl.Url=http://www.kaspersky.com/kaspersky_internet_security
Tmpl.Scan=s
Tmpl.ScanService=klim5
Tmpl.ScanService=klim6
OpenIpcPath=RPC ControlPRRemote:*
OpenIpcPath=*BaseNamedObjects*PRCustomProps*
OpenIpcPath=*BaseNamedObjects*PREvent*
OpenIpcPath=*BaseNamedObjects*PRObjects*
OpenIpcPath=*BaseNamedObjects*KLObj_mt_KLSCRIPTCHECKER_PR_*
OpenIpcPath=*BaseNamedObjects*__hex30-90__
OpenPipePath=DeviceNamedPipesa_hlp_srv
LingerProcess=klwtblfs.exe
# following setting comes from value DataRoot of the following key
# HKEY_LOCAL_MACHINESOFTWAREWow6432NodeKasperskyLabprotectedAVP9environment
OpenPipePath=%Tmpl.KasperskyDataRoot%~PR*.dat

[Template_Kaspersky_Pure_Password_Manager]
Tmpl.Title=Kaspersky Pure Password Manager
Tmpl.Class=Security
Tmpl.Url=http://www.kaspersky.com/kaspersky_internet_security
Tmpl.Scan=s
Tmpl.ScanProduct={1A59064A-12A9-469F-99F6-04BF118DBCFF}
# settings from Sticky Password template
OpenIpcPath=*BaseNamedObjects*Mutex*Process*API*
OpenIpcPath=*BaseNamedObjects*NamedBuffer*Process*API*
OpenIpcPath=*BaseNamedObjects*AutoUnhookMap*
OpenIpcPath=*BaseNamedObjects*mchLLEW2*
OpenIpcPath=*BaseNamedObjects*mchMixCache*
OpenIpcPath=*BaseNamedObjects*PCActivityHookInfo:*
OpenIpcPath=*BaseNamedObjects*spAutofillInfo:*
OpenIpcPath=*BaseNamedObjects*spCaptionButtonInfo:*
OpenIpcPath=*BaseNamedObjects*TtsMappedObject_Tts*
OpenIpcPath=*BaseNamedObjects*{CEA68AE7-EF0E-4AD5-9BAF-38DB1A30EF56-*
OpenIpcPath=*BaseNamedObjects*spPasswordAssistantClosedEvent:*
OpenWinClass=$:stpass.exe
NoRenameWinClass=Internet Explorer_Server
# settings specific to Kaspersky Pure
OpenIpcPath=*BaseNamedObjects*kpmPasswordAssistantClosedEvent:*
OpenIpcPath=*BaseNamedObjects*kpmAutofillInfo:*

3 replies

Userlevel 7
Badge +6
Below is the template for LastPass.
 
[Template_LastPass]
Tmpl.Title=LastPass
Tmpl.Class=Security
Tmpl.Url=https://lastpass.com/
Tmpl.Scan=s
Tmpl.ScanKey=REGISTRYMACHINESOFTWAREClasseslpgetr
Tmpl.ScanFile=%{A520A1A4-1780-4FF6-BD18-167343C5AF16}%LastPass
OpenFilePath=<Template_LastPass>,%USERPROFILE%*LastPass*
ProcessGroup=<Template_LastPass>,iexplore.exe,firefox.exe,opera.exe,chrome.exe
Userlevel 7
Badge +6
Shameless bump 🙂
Userlevel 5
Hello!
I am checking on this for you as well. I know development is under a bit of a crunch right now but I am asking if this is something that is possible with WSA, amount of resources to acomplish if possible, and ETA...
 
Thank you sir!

Reply