During the first day of the Pwn2Own 2020 hacking competition, participants earned a total of $180,000 for exploits targeting Windows 10, Ubuntu Desktop and macOS .
The Coronavirus outbreak hasn’t stopped the Pwn2Own hacking conference, for the first time its organizer, the Zero Day Initiative (ZDI), has decided to arrange the event allowing the participants to remotely demonstrate their exploits.
On the first day of Pwn2Own 2020, a team from the Georgia Tech Systems Software & Security Lab (@SSLab_Gatech) successfully exploited a kernel privilege escalation to execute code on
“1000 – The Georgia Tech Systems Software & Security Lab (@SSLab_Gatech) team of Yong Hwi Jin (@jinmo123), Jungwon Lim (@setuid0x0_), and Insu Yun (@insu_yun_en) targeting Apple Safari with a
“SUCCESS – The team from Georgia Tech used a six bug chain to pop calc and escalate to root. They earn $70,000 USD and 7 Master of Pwn points.”
The popular Team Fluoroacetate (Amat
Manfred Paul of the
On the second day of Pwn2Own 2020, participants will attempt to hack Oracle VirtualBox, VMware Workstation and Adobe Reader.
Below the schedule of the day2 of the event:
- 1000 – Phi Phạm Hồng (@4nhdaden) of STAR Labs (@starlabs_sg) targeting Oracle VirtualBox in the Virtualization category.
- 1200 – The Fluoroacetate team of Amat Cama and Richard Zhu targeting Adobe Reader with a Windows local privilege escalation.
- 1400 – The Synacktiv team of Corentin Bayet (@OnlyTheDuck) and Bruno Pujos (@BrunoPujos) targeting the VMware Workstation in the Virtualization category.
- 1600 – Special demonstration from Lucas Leong of the Zero Day Initiative against Oracle VirtualBox.
[adrotate banner=”9″] | [adrotate banner=”12″] |
(
[adrotate banner=”5″]
[adrotate banner=”13″]