Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ Pwn2Own Returns to Vancouver for 2020

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š Pwn2Own Returns to Vancouver for 2020


๐Ÿ’ก Newskategorie: Hacking
๐Ÿ”— Quelle: thezdi.com

Jump to the contest rules

As each new year starts, we at the Zero Day Initiative begin to think of spring and the Vancouver edition of the Pwn2Own contest. It was in Vancouver where the contest began back in 2007 and continues to be where we push the research community and ourselves with new challenges. What do we want to see demonstrated? What products should we focus on? Last year, we raised more than a few eyebrows by partnering with Tesla to include a Model 3, the best-selling car in its class in the U.S., as a target, and we ended up awarding the car to two talented researchers. We wanted to include Tesla because they pioneered the concept of a connected car and over-the-air updates nearly a decade ago, and they have been leading the space ever since.

This year, Tesla returns to the contest. Driving off with a brand-new Model 3 will be a harder challenge this year, which means the potential rewards will be much higher as well. Microsoft also returns as partner and VMware returns as a sponsor with their somewhat more traditional Pwn2Own targets. All told, more than $1,000,000 USD in cash and prizes are available to contestants, including the new Tesla car.

As usual, we will hold Pwn2Own at the CanSecWest conference, which occurs on March 18-20 of this year. Hereโ€™s a complete look at all six of the categories available for this contest:

-- Automotive Category
-- Web Browser Category
-- Virtualization Category
-- Enterprise Applications Category
-- Server-Side Category
-- Local Escalation of Privilege Category

And, of course, Pwn2Own would not be complete without us crowning a Master of Pwn. Since the order of the contest is decided by a random draw, contestants with an unlucky draw could still demonstrate fantastic research but receive less money since subsequent rounds go down in value. However, the points awarded for each successful entry do not go down. Someone could have a bad draw and still accumulate the most points. The person or team with the most points at the end of the contest will be crowned Master of Pwn, receive 65,000 ZDI reward points (instant Platinum status), a killer trophy, and a pretty snazzy jacket to boot.

Letโ€™s take a look at the details of the rules for this yearโ€™s contest.

Automotive Category: Tesla Model 3

Last year was the first year for the Automotive category, and weโ€™re excited to have Tesla return as partner for 2020. However, we wanted to up the level of complexity for this yearโ€™s event. Tesla vehicles are equipped with multiple layers of security, and this time around, there are three different tiers of awards within the Automotive category that correspond to some of the different layers of security within a Tesla car, with additional prize options available in certain instances.

Tier 1 earns the top prizes and represents a complete vehicle compromise. Correspondingly, this also has the highest award amounts. To win this level, a contestant will need to pivot through multiple systems in the car, meaning they will need a complex exploit chain to get arbitrary code execution on three different sub-systems in the vehicle. Success here gets a big payout and, of course, a brand-new Tesla Model 3.

TeslaTier1.png

In addition to the vehicle itself and $500,000, contestants can go for the additional options to raise the payout to $700,000. This represents the single largest target in Pwn2Own history. If someone is able to do this, it would also mean 70 total Master of Pwn points, which is nearly insurmountable. Hereโ€™s some additional info on the optional add-ons.

TeslaAddOn.png

Again, itโ€™s hard to express the difficulty in completing such a demonstration, but weโ€™re certainly hopeful someone is able to show off their exploit skills.

Tier 2 is not quite as complex but would still require the attacker to pivot through some of the vehicleโ€™s sub-systems. This level requires the contestant to get arbitrary code execution on two different sub-systems in the vehicle, which is certainly a difficult challenge. If you include the optional targets, the largest payout for Tier 2 would be $500,000.ย A wining entry in Tier 2 would still be a pretty impressive and exciting demonstration, and includes driving off with the Model 3.

TeslaTier2.png

The targets in Tier 3 are just as difficult, but you only need to compromise one sub-system for a win here, which is still no easy task. Not every instance within Tier 3 includes winning the car. To drive away with a Tier 3 prize, a contestant would need to target one of the entries marked โ€œVehicle Includedโ€ in the table below.

TeslaTier3d.png

Entries against Modem or Tuner, Wi-Fi or Bluetooth, and Gateway, Autopilot, or VCSEC targets must achieve code execution by communicating with a rogue base station or other malicious entity. Entries against the Infotainment target must be launched from the target under test and must achieve code execution by browsing to malicious content. In Tier 1 and Tier 2, man-in-the-middle browser attacks against the Infotainment system are not allowed. Any Infotainment entry that leverages vulnerabilities in the built-in browser must be chained with a sandbox escape or a root/kernel privilege escalation. USB-based attacks in the Infotainment category must target the USB port that passengers would routinely plug into that is openly exposed on the center console. Any other exposed USB ports are not in scope for this contest. Entries against the Key Fobs or Phone-as-Key target must achieve code execution, arbitrary vehicle unlock, or arbitrary vehicle start using protocol-related weaknesses. Entries related to Key Fob relay or rolljam attacks are not allowed.

As always, please refer to the rules for complete details and donโ€™t hesitate to email your specific questions to us ahead of the contest.

Back to categories

Web Browser Category

Probably the most traditional category for Pwn2Own, the Web Browser category also sees a few changes this year. Now that Microsoft Edge has both an EDGEHTML-based version and a Chromium-based version, both are included as targets. This presents an interesting opportunity โ€“ and an interesting challenge. If a single entry is able to compromise both Google Chrome and Microsoft Edge (Chromium), the contestant will receive an additional $50,000 and 5 more Master of Pwn points.

Browsers3.png

In this category, the Windows-based targets will be running in a VMware Workstation virtual machine. Consequently, all browsers except Safari are eligible for a VMware escape add-on. If a contestant is able to compromise the browser in such a way that also executes code on the host operating system by escaping the VMware Workstation virtual machine, they will earn themselves an additional $70,000 and 7 more Master of Pwn points.

Back to categories

Virtualization Category

This category was introduced several years ago and continues to produce some of the most interesting research of the conference. Itโ€™s always awe-inspiring (and just a tad terrifying) to see an exploit escape from a virtual machine and execute code on the host OS. Microsoft Hyper-V headlines this category, with VMware Workstation, VMware ESXi, and Oracle VirtualBox as the other targets.

Virtualization.png

For Oracle VirtualBox, VMware Workstation, and Microsoft Hyper-V Client, both the guest and the host operating system will be running Microsoft Windows 10 19H2 x64. For VMware ESXi, the guest operating system will be running Microsoft Windows 10 19H2 x64.

Thereโ€™s an add-on bonus in this category as well. If a contestant can escape the guest OS, then escalate privileges on the host OS through a Windows kernel vulnerability (excluding VMware ESXi), they can earn an additional $40,000 and 4 more Master of Pwn points.

Back to categories

Enterprise Applications Category

Applications remain at the heart of our day-to-day computing lives, and for 2020, weโ€™re including two of the most popular apps for this category. This year, Adobe Reader and Microsoft Office 365 Plus encompass this category. The Office targets will be running Microsoft Office 365 Professional Plus x64 (Monthly Channel) on Windows 10 x64. Microsoft Office-based targets will have Protected View enabled. Adobe Reader will have Protected Mode enabled.

EnterpriseApps.png

Back to categories

Server-Side Cetegory

Similar to last year, the Server-Side category contains only Microsoft Windows RDP as most of our other server-side targets are represented in our Targeted Incentive Program. Itโ€™s been a fascinating year for RDP bugs, so it will be interesting to see if anyone brings a Bluekeep-like exploit to demonstrate. If they do, theyโ€™ll earn themselves $150,000 and 15 Master of Pwn points.

Servers.png

Back to categories

Local Escalation of Privilege Category

This category is one weโ€™ve included in the past, although it has had a brief absence from the contest. This category focuses on attacks that originate from a standard user and result in executing code as a high-privileged user. This is a common tactic for malware and ransomware, so these bugs are highly relevant. In this category, the entry must leverage a kernel vulnerability to escalate privileges. We picked two of the most popular operating systems for this category: Ubuntu Desktop and Microsoft Windows 10.

EoP.png

Back to categories

Conclusion

The complete rules for Pwn2Own 2020 are foundย here. As always, we encourage entrants to read theย rulesย thoroughly if they choose to participate. If you are thinking about participating but have a specific configuration or rule-related questions,ย emailย us. Questions asked over Twitter or other means are not guaranteed to be answered. Registration is required to ensure we have sufficient resources on hand at the event. Please contact ZDI at zdi@trendmicro.com to begin the registration process. Registration closes at 5 p.m. Pacific Time on March 13, 2020.

Be sure to stay tuned to this blog and follow us onย Twitterย for the latest information and updates about the contest. We look forward to seeing everyone in Vancouver, and we hope someone again has a sweet ride home from this yearโ€™s Pwn2Own competition.

With special thanks to our Pwn2Own 2020 Partners Tesla and Microsoft

Microsoft-logo_rgb_c-gray.png

Thanks also to our Pwn2Own 2020 Sponsor VMware

VMware_logo_gry_RGB_300dpi.jpg

...



๐Ÿ“Œ Pwn2Own Returns to Vancouver for 2020


๐Ÿ“ˆ 46.95 Punkte

๐Ÿ“Œ Pwn2Own Vancouver Returns for the 15th Anniversary of the Contest


๐Ÿ“ˆ 44.39 Punkte

๐Ÿ“Œ Pwn2Own Vancouver 2024: Bringing Cloud-Native/Container Security to Pwn2Own


๐Ÿ“ˆ 44.29 Punkte

๐Ÿ“Œ Pwn2Own Vancouver 2019: Tesla, VMware, Microsoft, and More


๐Ÿ“ˆ 31.67 Punkte

๐Ÿ“Œ Pwn2Own Vancouver 2019 - The Schedule and Live Results


๐Ÿ“ˆ 31.67 Punkte

๐Ÿ“Œ Pwn2Own Vancouver 2019: Day One Results


๐Ÿ“ˆ 31.67 Punkte

๐Ÿ“Œ Pwn2Own Vancouver 2019: Day One Results


๐Ÿ“ˆ 31.67 Punkte

๐Ÿ“Œ Pwn2Own Vancouver 2019: Day Schedule Results and Live Results


๐Ÿ“ˆ 31.67 Punkte

๐Ÿ“Œ Pwn2Own Vancouver 2019: Day Two Results


๐Ÿ“ˆ 31.67 Punkte

๐Ÿ“Œ Pwn2Own Vancouver 2019: Wrapping Up and Rolling Out


๐Ÿ“ˆ 31.67 Punkte

๐Ÿ“Œ Announcing Remote Participation in Pwn2Own Vancouver


๐Ÿ“ˆ 31.67 Punkte

๐Ÿ“Œ Regarding Pwn2Own Vancouver


๐Ÿ“ˆ 31.67 Punkte

๐Ÿ“Œ Announcing Pwn2Own Vancouver 2021


๐Ÿ“ˆ 31.67 Punkte

๐Ÿ“Œ Pwn2Own Vancouver 2022 - The Schedule


๐Ÿ“ˆ 31.67 Punkte

๐Ÿ“Œ Zero Day Initiative โ€” Pwn2Own Vancouver 2022 - The Results


๐Ÿ“ˆ 31.67 Punkte

๐Ÿ“Œ Pwn2Own Vancouver 2022 - Bruno PUJOS vs Microsoft Windows 11


๐Ÿ“ˆ 31.67 Punkte

๐Ÿ“Œ Pwn2Own Vancouver 2022 - Day 2 Recap


๐Ÿ“ˆ 31.67 Punkte

๐Ÿ“Œ Announcing Pwn2Own Vancouver for 2023


๐Ÿ“ˆ 31.67 Punkte

๐Ÿ“Œ Pwn2Own Vancouver 2023: Zero-Day Exploits Revealed for Tesla Model 3, Windows 11, and macOS


๐Ÿ“ˆ 31.67 Punkte

๐Ÿ“Œ Pwn2Own Vancouver 2023 - Day Two Results


๐Ÿ“ˆ 31.67 Punkte

๐Ÿ“Œ Pwn2Own Vancouver 2022 - The Results


๐Ÿ“ˆ 31.67 Punkte

๐Ÿ“Œ Pwn2Own Vancouver 2022 D1: MS Teams exploits received $450,000


๐Ÿ“ˆ 31.67 Punkte

๐Ÿ“Œ Wrapping Up Pwn2Own Vancouver Day Two


๐Ÿ“ˆ 31.67 Punkte

๐Ÿ“Œ Wrapping Up Pwn2Own Vancouver Day One


๐Ÿ“ˆ 31.67 Punkte

๐Ÿ“Œ Hackers earn $1,035,000 for 27 zero-days exploited at Pwn2Own Vancouver


๐Ÿ“ˆ 31.67 Punkte

๐Ÿ“Œ CVE-2023-20869/20870: Exploiting VMware Workstation at Pwn2Own Vancouver


๐Ÿ“ˆ 31.67 Punkte

๐Ÿ“Œ Pwn2Own Vancouver 2024: Security Researchers Rack Up $1.13M with 29 Zero-Day Exploits


๐Ÿ“ˆ 31.67 Punkte

๐Ÿ“Œ Pwn2Own Vancouver 2022 D2


๐Ÿ“ˆ 31.67 Punkte

๐Ÿ“Œ The Pwn2Own Vancouver 2022: Trend Micro and ZDI awarded $1,155,000


๐Ÿ“ˆ 31.67 Punkte

๐Ÿ“Œ Pwn2Own Vancouver 2023 - Day One Results


๐Ÿ“ˆ 31.67 Punkte

๐Ÿ“Œ Pwn2Own Vancouver 2023 Day 1: Windows 11 and Tesla hacked


๐Ÿ“ˆ 31.67 Punkte

๐Ÿ“Œ Pwn2Own Vancouver 2023 Day 2: Microsoft Teams, Oracle VirtualBox, and Tesla hacked


๐Ÿ“ˆ 31.67 Punkte

๐Ÿ“Œ Pwn2Own Vancouver 2024 - Day Two Results


๐Ÿ“ˆ 31.67 Punkte

๐Ÿ“Œ Pwn2Own Vancouver 2024 - Day One Results


๐Ÿ“ˆ 31.67 Punkte

๐Ÿ“Œ Pwn2Own Vancouver 2023 - The Full Schedule


๐Ÿ“ˆ 31.67 Punkte











matomo