Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ Pwn2Own Day Two โ€“ Results and Master of Pwn

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š Pwn2Own Day Two โ€“ Results and Master of Pwn


๐Ÿ’ก Newskategorie: Hacking
๐Ÿ”— Quelle: thezdi.com

The final day of Pwn2Own 2020 came to a close yesterday, but not before a bit of drama, intrigue, and more great research. We saw two successful attempts, which resulted in four new bugs earning $90,000. That brings the two-day total to $270,000. Hereโ€™s a quick recap of Day Two and the entire event:ย 

Our day began with returning Pwn2Own veteran Phi Phแบกm Hแป“ng (@4nhdaden) of STAR Labs (@starlabs_sg) targeting Oracle VirtualBox in the Virtualization category. It took all three attempts for a successful demonstration, which heightened the drama, but his third attempt worked like a charm. He combined an info leak & an uninitialized variable to execute code on the host OS from the guest OS. This earned him $40,000 and four points towards Master of Pwn.

Figure 1 โ€“ Phi Phแบกm Hแป“ng of STAR Labs watches his Oracle exploit succeed

Figure 1 โ€“ Phi Phแบกm Hแป“ng of STAR Labs watches his Oracle exploit succeed

Next up, the Fluoroacetate duo of Amat Cama and Richard Zhu returned for their second event of the competition. This time, they had their sights set on Adobe Reader. In one of the most impressive displays of the competition, they leveraged UAFs in Reader and Windows kernel to escalate to SYSTEM. All it took was opening a PDF and the entire system was compromised. This impressive display earned them another $50,000 and 5 more points towards Master of Pwn.

Figure 2: The Fluoroacetate duo of Richard Zhu (top) and Amat Cama exploit Adobe Reader

Figure 2: The Fluoroacetate duo of Richard Zhu (top) and Amat Cama exploit Adobe Reader

In the final official entry of Pwn2Own 2020, the Synacktiv team of Corentin Bayet (@OnlyTheDuck) and Bruno Pujos (@BrunoPujos) targeted VMware Workstation with a guest-to-host escape. Unfortunately, they could not successfully demonstrate their exploit in the allotted time. However, upon disclosure, we did find the bug to be valid and purchased it through the regular ZDI program. We hope to see more from these researchers in the future.

Figure 3 - The Synactiv team of Bruno Pujos (top) and Corentin Bayet

Figure 3 - The Synactiv team of Bruno Pujos (top) and Corentin Bayet

In a special bonus feature, ZDIโ€™s own Lucas Leong (@_wmliang_) demonstrated a guest-to-host escape in Oracle VirtualBox. He leveraged an out-of-bounds read for an info leak and a use-after-free for code execution. You can watch a video of the demonstration on our YouTube channel.

That brings to a close this yearโ€™s event. As always, vendors have received the details of these bugs and vendors of Pwn2Own-awarded bug reports have 90 days to produce security patches to address the issues we reported. Once these are made public, stay tuned to this blog for more details about some of the best and most interesting research we saw this week.ย 

It was a tighter race than previous years, but Richard Zhu and Amat Cama of Fluoroacetate again were crowned the Master of Pwn. In addition to the trophy and custom hockey jerseys, they receive 65,000 ZDI reward points, which gives them Platinum status.

Figure 4: Final Master of Pwn standings

Figure 4: Final Master of Pwn standings

Special Thanks

ย We wanted to be sure to thank everyone who participated in this yearโ€™s competition. There were definitely hurdles to clear, but everyone was accommodating and worked with us to make Pwn2Own 2020 happen. We want to thank the participants for trusting us with their research and allowing us to run each attempt. We want to thank Microsoft, VMware, Apple, Adobe, and Canonical for dialing in throughout the disclosure process. Their continued involvement in coordinated disclosure and security response processes helps the entire community. Special thanks also go out to our partners Microsoft and Tesla and sponsor VMware for their support and assistance before and during the contest.

ย The world right now is a tumultuous place full of uncertainty. It is communities, such as the security research community and the incident response community, that we can rely on during these trying times. We are so appreciative of all those who helped the event come together and succeed. Weโ€™ll get through this together, and we hope to see you again at our next event. Until then, you can follow theย teamย for the latest in exploit techniques and security patches.

...



๐Ÿ“Œ Pwn2Own Tokyo 2018 - Day Two Results and Master of Pwn


๐Ÿ“ˆ 60.11 Punkte

๐Ÿ“Œ Pwn2Own Day Two โ€“ Results and Master of Pwn


๐Ÿ“ˆ 60.11 Punkte

๐Ÿ“Œ Pwn2Own Tokyo (Live from Toronto) โ€“ Day Three Results and Master of Pwn


๐Ÿ“ˆ 53.02 Punkte

๐Ÿ“Œ Pwn2Own Toronto 2022 - Day Four Results and Master of Pwn


๐Ÿ“ˆ 53.02 Punkte

๐Ÿ“Œ Pwn2Own Vancouver 2019: Day Schedule Results and Live Results


๐Ÿ“ˆ 40.84 Punkte

๐Ÿ“Œ Pwn2Own Tokyo Day 3: Team Flashback crowned Master of Pwn


๐Ÿ“ˆ 40.46 Punkte

๐Ÿ“Œ Pwn2Own Tokyo 2019 - Day Two and Final Results


๐Ÿ“ˆ 37.15 Punkte

๐Ÿ“Œ Pwn2Own 2017 - Day Two Results


๐Ÿ“ˆ 35.37 Punkte

๐Ÿ“Œ Pwn2Own Vancouver 2019: Day Two Results


๐Ÿ“ˆ 35.37 Punkte

๐Ÿ“Œ Pwn2Own Tokyo 2019 โ€“ Day Two Final Results


๐Ÿ“ˆ 35.37 Punkte

๐Ÿ“Œ Pwn2Own Tokyo (Live from Toronto) - Day Two Results


๐Ÿ“ˆ 35.37 Punkte

๐Ÿ“Œ Pwn2Own Tokyo 2020 (Live from Toronto ) - Day Two Results


๐Ÿ“ˆ 35.37 Punkte

๐Ÿ“Œ Pwn2Own Miami 2023 - Day Two Results


๐Ÿ“ˆ 35.37 Punkte

๐Ÿ“Œ Pwn2Own Vancouver 2023 - Day Two Results


๐Ÿ“ˆ 35.37 Punkte

๐Ÿ“Œ Pwn2Own Toronto 2022 - Day Two Results


๐Ÿ“ˆ 35.37 Punkte

๐Ÿ“Œ Pwn2Own Toronto 2023 - Day Two Results


๐Ÿ“ˆ 35.37 Punkte

๐Ÿ“Œ Pwn2Own Automotive 2024 - Day Two Results


๐Ÿ“ˆ 35.37 Punkte

๐Ÿ“Œ Pwn2Own Vancouver 2024 - Day Two Results


๐Ÿ“ˆ 35.37 Punkte

๐Ÿ“Œ Mobile Pwn2Own 2017 - Day 2 Results


๐Ÿ“ˆ 28.28 Punkte

๐Ÿ“Œ Mobile Pwn2Own 2017 - Day 1 Results


๐Ÿ“ˆ 28.28 Punkte

๐Ÿ“Œ Pwn2Own 2017 - Day Three Results


๐Ÿ“ˆ 28.28 Punkte

๐Ÿ“Œ Pwn2Own 2017 - Day One Results


๐Ÿ“ˆ 28.28 Punkte

๐Ÿ“Œ Pwn2Own Vancouver 2019: Day One Results


๐Ÿ“ˆ 28.28 Punkte

๐Ÿ“Œ Pwn2Own Vancouver 2019: Day One Results


๐Ÿ“ˆ 28.28 Punkte

๐Ÿ“Œ Pwn2Own Tokyo 2019 โ€“ Day One Results


๐Ÿ“ˆ 28.28 Punkte

๐Ÿ“Œ Pwn2Own Tokyo 2019 - Day One Results


๐Ÿ“ˆ 28.28 Punkte

๐Ÿ“Œ Pwn2Own Tokyo (Live from Toronto) - Day One Results


๐Ÿ“ˆ 28.28 Punkte

๐Ÿ“Œ Pwn2Own Tokyo 2020 (Live From Toronto) - Day One Results


๐Ÿ“ˆ 28.28 Punkte

๐Ÿ“Œ Zero Day Initiative โ€” Pwn2Own Vancouver 2022 - The Results


๐Ÿ“ˆ 28.28 Punkte

๐Ÿ“Œ Pwn2Own Toronto 2023 - Day One Results


๐Ÿ“ˆ 28.28 Punkte

๐Ÿ“Œ Pwn2Own Tokyo 2018: Day One Results


๐Ÿ“ˆ 28.28 Punkte

๐Ÿ“Œ Pwn2Own 2020 โ€“ Day One Results


๐Ÿ“ˆ 28.28 Punkte

๐Ÿ“Œ Pwn2Own Toronto 2022 - Day One Results


๐Ÿ“ˆ 28.28 Punkte

๐Ÿ“Œ Pwn2Own Toronto 2022 - Day Three Results


๐Ÿ“ˆ 28.28 Punkte

๐Ÿ“Œ Pwn2Own Miami 2023 - Day One Results


๐Ÿ“ˆ 28.28 Punkte











matomo