I am interested in potential/actual attacks against kiosk software.
I am not talking about physical access, or specifically designed kiosk operating systems or shells, bur rather software that runs over windows and attempts to prevent access. All too often this software runs on top of explorer and I wonder just how secure it could be, given that is the case?
One product for example, ShellPro I have had experience with. Just out of curiosity and playing around I managed to get task manager and a command prompt up. I could not access drive contents at all, but it was a custom dialog preventing access.
Running something on top of the OS like this would not seem to be a secure way of denying access, as if you can tap into any OS functionality then you will have access AFAIK.
What about running a script through an allowed application? JavaScript in the address bar? Windows Script Host? Macros?
Are there not many simple attacks against these kinds of software, or can they actually serve the purpose for which they are designed? Such software always seemed to me only useful against people who didn't have basic Windows knowledge, but I don't know if that perception is accurate at all.
Just how effective is such software and what ways can it be bypassed?