Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ Announcing Pwn2Own Tokyo 2020 โ€“ Live from Toronto!

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š Announcing Pwn2Own Tokyo 2020 โ€“ Live from Toronto!


๐Ÿ’ก Newskategorie: Hacking
๐Ÿ”— Quelle: thezdi.com

If you just want to read the rules, you can find them here.

Over the past few years, our Fall Pwn2Own contest has been held at the PacSec Applied Security Conference in Tokyo, Japan. This year, PacSec will be held virtually, so we began to look at how we could do a virtual Pwn2Own Tokyo similar to how we held our Spring event. Pwn2Own Tokyo typically focuses on devices like mobile phones, televisions, smart speakers, and wireless routers โ€“ physical devices that make it problematic to go completely virtual. However, the Zero Day Initiative (ZDI) has a large team of researchers in our Toronto office, which provides us a perfect setting to hold the contest. For 2020, our Pwn2Own Tokyo event will come to you live from Toronto and coincide with the virtual PacSec Conference, which is currently scheduled for November 1-6, 2020. We'll be holding the competition on November 3-5, 2020. ย Weโ€™ll have 20 devices available as targets and be offering more than $500,000 USD in prize money.

Similar to how we conducted our Spring Pwn2Own event, we will allow remote participation in this yearโ€™s Pwn2Own Tokyo event. If you have either travel restrictions or travel-safety concerns, you can opt to compete remotely. You will still need to register before the contest deadline (October 29, 2020) and submit a detailed whitepaper completely explaining your exploit chain and instructions on how to run the entry by November 1, 2020. A member of the ZDI staff in Toronto will run the exploit for you. All attempts will be filmed and available for viewing by the contestant and the vendor. If requested, we will work with remote contestants to monitor the attempt in real-time via a phone call or video chat. Please note that since you are not in person, changes to exploits/scripts/etc. will not be possible, which could lower your chance of winning should something unexpected occur.

Otherwise, the contest will run as though we were in Tokyo. We will have a random drawing to determine the schedule of attempts on the first day of the contest, and we will proceed from there. Our intention with allowing remote participation is to provide as many people as possible with the benefits of participating in Pwn2Own while still treating all contestants as equally as possible. If you have questions about this remote participation option, please contact us at zdi@trendmicro.com. We will be happy to address your questions or concerns directly.

As for the contest itself, weโ€™re happy to announce Facebook returns as a partner for this yearโ€™s event, again offering Oculus Quest and Portal from Facebook devices return as targets. No one targeted either device during their inaugural show, so it will be interesting to see if anyone targets them this year. Vendor participation remains a key component to the success of these contests. As with our other Pwn2Own competitions, Pwn2Own Tokyo (Live from Toronto) seeks to harden these consumer-focused devices and their operating systems by revealing vulnerabilities and providing that knowledge to the vendors. As always, the goal is to get these bugs fixed before theyโ€™re actively exploited.

The Target Handsets

At its heart, Pwn2Own Tokyo (once known as Pwn2Own Mobile) looks at mobile phones, and this year is no different. Here are the target handsets for Pwn2Own Tokyo 2020:

-ย ย ย ย ย  Google Pixel 4
-ย ย ย ย ย  Samsung Galaxy S20
-ย ย ย ย ย  Apple iPhone 11
- ย ย ย ย  Huawei P40
-ย ย ย ย ย  Xiaomi Mi 10

As usual, all these phones will be running the latest version of their respective operating systems with all available updates installed.

Smart Speakers, Wearables, Network Attached Storage, Televisions, and More

Over the past few years, weโ€™ve been expanding the targets to include more than just mobile phones. Last year, we introduced wireless routers and televisions into the mix. This year, we expand once again by including Network Attached Storage (NAS) servers. Hereโ€™s the full list of all devices included in this yearโ€™s event:

Wearables:

-ย ย ย ย ย  Apple Watch Series 5
-ย ย ย ย ย  Oculus Quest (64Gb)

ย Home Automation:

-ย ย ย ย ย  Portal from Facebook
-ย ย ย ย ย  Amazon Echo Show 8
-ย ย ย ย ย  Google Nest Hub Max
-ย ย ย ย ย  Sonos One Speaker
-ย ย ย ย ย  Nest Cam IQ Indoor camera
-ย ย ย ย ย  Ring Indoor Cam
-ย ย ย ย ย  Arlo Q Plus Indoor camera

Televisions:

-ย ย ย ย ย  Sony X800H Series - 43โ€
-ย ย ย ย ย  Samsung Q60T Series โ€“ 43โ€

Routers:

-ย ย ย ย ย  TP-Link AC1750 Smart Wi-Fi Router
-ย ย ย ย ย  NETGEAR Nighthawk Smart Wi-Fi Router (R7800)

NAS Server:

-ย ย ย ย ย  Synology DiskStation DS418play
-ย ย ย ย ย  Western Digital My Cloud Pro Series PR4100ย 

As with the phones, all these devices will be updated to the most recent patch level or system update, and all will be in their default configuration.

The Pwn2Own Tokyo (Live from Toronto!) Challenges for 2020

Now that you know the devices available, letโ€™s look at the different categories of challenges, starting with the various tests against mobile handsets.

Web Browser Category

In this category, contestants will target the default web browser of each particular handset. The awards for this category are:

Browser.jpg

This category also includes add-on bonuses for some of the handsets. If your exploit payload executes with kernel privileges on any of these handsets, you will earn an additional $30,000 and 3 more Master of Pwn points. There will also be a bonus for the exploit payload surviving a reboot. Accomplish this on the Google Pixel or either iPhone and you earn another $50,000 and 5 Master of Pwn points. That means a full iPhone or Pixel browser exploit with persistence and kernel-level access will earn $160,000.

Short Distance Category

In this category, contestants will target the phones over one of the following short distance protocols: Bluetooth, Wi-Fi, or near field communication (NFC). The awards for this category are:

Short Disctance.jpg

This category also has the same add-on bonuses as the browser category. That means another $30,000 and 3 Master of Pwn points for a kernel-level exploit, and $50,000 and 5 Master of Pwn points for persistence on the Google Pixel or Apple iPhones. ย 

Challenges Involving Other Devices

This is our third year of including IoT, wearable, and other hardware devices, and each year brings new research that exceeds our expectations. Last year, we saw the Amazon Echo compromised. This year, weโ€™re bringing even more smart speakers and introducing NAS servers to the mix. It should be interesting.

For the devices at Pwn2Own Tokyo that arenโ€™t mobile handsets, a successful entry will compromise the device and retrieve some form of sensitive information. For some of these challenges, local privilege escalations are in scope but result in a lower award.

Wearables

Wearable.jpg

Home Automation Category

Home Automation2.jpg

Television Category

Televisions.jpg

Wireless Router Category

For this category, contestants may target either the WAN or the LAN interface.

Routers.jpg

NAS Category

NAS.jpg

Master of Pwn

No Pwn2Own contest would be complete without crowning a Master of Pwn, which signifies the overall winner of the competition. Earning the title results in a slick trophy, a different sort of wearable, and brings with it an additional 65,000 ZDI reward points (instant Platinum status in 2021).

For those not familiar with how it works, points are accumulated for each successful attempt. While only the first demonstration in a category wins the full cash award, each successful entry claims the full number of Master of Pwn points. Since the order of attempts is determined by a random draw, those who receive later slots can still claim the Master of Pwn title โ€“ even if they earn a lower cash payout. As with previous contests, there are penalties for withdrawing from an attempt once you register for it. If the contestant decides to remove an Add-on Bonus during their attempt, the Master of Pwn points for that Add-on Bonus will be deducted from the final point total for that attempt. For example, someone registers for the Apple iPhone 11 in the Browser category with the Kernel Bonus Add-on. During the attempt, the contestant drops the Kernel Bonus Add-on but completes the Browser attempt. The final point total will be 5 Master of Pwn points.

The Complete Details

The full set of rules for Pwn2Own Tokyo 2020 is availableย here. They may be changed at any time without notice. We encourage entrants to read the rules thoroughly and completely should they choose to participate.

Registration is required to ensure we have sufficient resources on hand at the event. Please contact ZDI atย zdi@trendmicro.comย to begin the registration process. (Email only, please; queries via Twitter, blog post, or other means will not be acknowledged or answered.) If we receive more than one registration for any category, weโ€™ll hold a random drawing to determine contestant order. Registration closes at 5:00 p.m. Eastern Daylight Time on October 29, 2020.

The Results

Weโ€™ll be bloggingย and tweeting results in real-time throughout the competition. Be sure to keep an eye on the blog for the latest results. Follow us on Twitter atย @thezdiย andย @trendmicro, and keep an eye on theย #P2OTokyoย hashtag for continuing coverage.

We look forward to seeing everyone in Tokyo Toronto (or online), and we look forward to seeing what new exploits and attack techniques they bring with them.

With special thanks to Pwn2Own Tokyo 2020 partner Facebook for providing their technology:

combo-bluerp.png

ยฉ2020 Trend Micro Incorporated. All rights reserved. PWN2OWN, ZERO DAY INITIATIVE, ZDI, and Trend Micro are trademarks or registered trademarks of Trend Micro Incorporated. All other trademarks and trade names are the property of their respective owners.

...



๐Ÿ“Œ Announcing Pwn2Own Tokyo 2020 โ€“ Live from Toronto!


๐Ÿ“ˆ 62.71 Punkte

๐Ÿ“Œ Pwn2Own Tokyo (Live from Toronto) - Schedule and Live Results


๐Ÿ“ˆ 53.71 Punkte

๐Ÿ“Œ Pwn2Own Tokyo (Live from Toronto) 2020 - Day One


๐Ÿ“ˆ 51.74 Punkte

๐Ÿ“Œ Pwn2Own Tokyo 2020 (Live from Toronto ) - Day Two Results


๐Ÿ“ˆ 51.74 Punkte

๐Ÿ“Œ Pwn2Own Tokyo 2020 (Live From Toronto) - Day One Results


๐Ÿ“ˆ 51.74 Punkte

๐Ÿ“Œ Pwn2Own Tokyo (Live from Toronto) - Day One Results


๐Ÿ“ˆ 49.18 Punkte

๐Ÿ“Œ Pwn2Own Tokyo (Live from Toronto) - Day Two Results


๐Ÿ“ˆ 49.18 Punkte

๐Ÿ“Œ Pwn2Own Tokyo (Live from Toronto) โ€“ Day Three Results and Master of Pwn


๐Ÿ“ˆ 49.18 Punkte

๐Ÿ“Œ Announcing Pwn2Own Toronto 2022 and Introducing the SOHO Smashup!


๐Ÿ“ˆ 40.82 Punkte

๐Ÿ“Œ Announcing Pwn2Own Tokyo for 2019


๐Ÿ“ˆ 38.37 Punkte

๐Ÿ“Œ Toronto Tokyo logo


๐Ÿ“ˆ 32.03 Punkte

๐Ÿ“Œ Welcome to Pwn2Own Tokyo 2019 - Schedule and Live Updating Results


๐Ÿ“ˆ 31.94 Punkte

๐Ÿ“Œ ZDI Announces Rules, Prizes for Pwn2Own Tokyo 2020


๐Ÿ“ˆ 29.97 Punkte

๐Ÿ“Œ NETGEAR Router, WD NAS Device Hacked on First Day of Pwn2Own Tokyo 2020


๐Ÿ“ˆ 29.97 Punkte

๐Ÿ“Œ Routers, NAS Devices, TVs Hacked at Pwn2Own Tokyo 2020


๐Ÿ“ˆ 29.97 Punkte

๐Ÿ“Œ Pwn2Own Toronto 2022 Announced: More than $1,000,000 available in cash and prizes


๐Ÿ“ˆ 29.85 Punkte

๐Ÿ“Œ Pwn2Own Toronto 2022 - The Schedule


๐Ÿ“ˆ 29.85 Punkte

๐Ÿ“Œ Zero Day Initiative โ€” Pwn2Own Toronto 2022 - The Schedule


๐Ÿ“ˆ 29.85 Punkte

๐Ÿ“Œ Samsung Galaxy S22 hacked twice on first day of Pwn2Own Toronto


๐Ÿ“ˆ 29.85 Punkte

๐Ÿ“Œ Samsung Galaxy S22 hacked twice on first day of Pwn2Own Toronto


๐Ÿ“ˆ 29.85 Punkte

๐Ÿ“Œ Pwn2Own Toronto 2022, Day 1: Hackers Earn $400,000 for Galaxy S22, SOHO Exploits


๐Ÿ“ˆ 29.85 Punkte

๐Ÿ“Œ Samsung Galaxy S22 schon zwei Mal gehackt am ersten Tag des Pwn2Own Toronto


๐Ÿ“ˆ 29.85 Punkte

๐Ÿ“Œ Pwn2Own Toronto 2022 - Day One Results


๐Ÿ“ˆ 29.85 Punkte

๐Ÿ“Œ Pwn2Own Toronto 2022 hacking competition. Samsung S22 hacked


๐Ÿ“ˆ 29.85 Punkte

๐Ÿ“Œ Pwn2Own Toronto 2022 - Day Two Results


๐Ÿ“ˆ 29.85 Punkte

๐Ÿ“Œ SOHO Exploits Earn Hackers Over $100,000 on Day 3 of Pwn2Own Toronto 2022


๐Ÿ“ˆ 29.85 Punkte

๐Ÿ“Œ Samsung Galaxy S22 gets hacked in 55 seconds at Pwn2Own Toronto


๐Ÿ“ˆ 29.85 Punkte

๐Ÿ“Œ Pwn2Own Toronto 2022 Results


๐Ÿ“ˆ 29.85 Punkte

๐Ÿ“Œ Hackers earn $989,750 for 63 zero-days exploited at Pwn2Own Toronto


๐Ÿ“ˆ 29.85 Punkte

๐Ÿ“Œ Device Exploits Earn Hackers Nearly $1 Million at Pwn2Own Toronto 2022


๐Ÿ“ˆ 29.85 Punkte

๐Ÿ“Œ Samsung Galaxy S22 schon zwei Mal gehackt am ersten Tag des Pwn2Own Toronto


๐Ÿ“ˆ 29.85 Punkte

๐Ÿ“Œ Pwn2Own Toronto 2022, Day 2: Smart Speaker Exploits Earn Big Chunk of $280,000 Total


๐Ÿ“ˆ 29.85 Punkte

๐Ÿ“Œ Pwn2Own Toronto 2022 - Day Three Results


๐Ÿ“ˆ 29.85 Punkte

๐Ÿ“Œ Pwn2Own Toronto: 54 hacks, 63 new bugs, $1 million in bounties


๐Ÿ“ˆ 29.85 Punkte

๐Ÿ“Œ Behind the Scenes of Pwn2Own Toronto 2022


๐Ÿ“ˆ 29.85 Punkte











matomo