The Coronavirus outbreak hasn’t stopped the Pwn2Own hacking conference, for the first time its organizer, the Zero Day Initiative (ZDI), has decided to arrange the event allowing the participants to remotely demonstrate their exploits.
On the first day of Pwn2Own 2020, a team from the Georgia Tech Systems Software & Security Lab (@SSLab_Gatech) successfully exploited a kernel privilege escalation to execute code on
“1000 – The Georgia Tech Systems Software & Security Lab (@SSLab_Gatech) team of Yong Hwi Jin (@jinmo123), Jungwon Lim (@setuid0x0_), and Insu Yun (@insu_yun_en) targeting Apple Safari with a
“SUCCESS – The team from Georgia Tech used a six bug chain to pop calc and escalate to root. They earn $70,000 USD and 7 Master of Pwn points.”
The popular Team Fluoroacetate (Amat
Manfred Paul of the
On the second day of Pwn2Own 2020, participants will attempt to hack Oracle VirtualBox, VMware Workstation and Adobe Reader.
Below the schedule of the day2 of the event:
|[adrotate banner=”9″]||[adrotate banner=”12″]|