The Tianfu Cup 2019 International Cyber Security Competition has started, white hat hackers will attempt to devise working
Each working exploit receives a cash prize and points that are assigned to the team that devised it, like the popular Pwn2Own hacking contest.
Chinese white hat hackers have a long story of success, they won several international hacking contests in the past, but in 2018 the Chinese government prohibited Chinese experts in participating this kind of competition abroad.
Since the decision of the Chinese Government, the TianfuCup was set up for the first time in the fall of 2018. Last year, white hat hackers earned more than $1 million for zero-day exploits disclosed at the Tianfu Cup PWN competition.
According to the
During the Day1 of the Tianfu Cup 2019 contest 13 hacking attempts out of a total of 32 were successful, 13 attempts failed and in 12 cases the researchers abandoned the attempts.
Below the list of successful attempts:
Congrats! All the three Edge exploits are confirmed to be success! Teams ddd @ExpSky and 360vulcan @mj0011sec both achieved RCE + sandbox escape, so each earned $55,000. Team .(dot) get $10,000 with RCE.
— TianfuCup (@TianfuCup) November 16, 2019
Exploit against #Chrome are verified to be effective. Team 0x34567a61 @Xbalien29 @leonwxqian and Team ddd @ExpSky got $20,000 in their pockets, respectively. Congrats!
— TianfuCup (@TianfuCup) November 16, 2019
StackLeader @codecolorist was just verified to get a partially successful entry on #Safari. They earned a bonus of $30,000.
— TianfuCup (@TianfuCup) November 16, 2019
Three teams HAC, team StackLeader @yuzhou6666 @ppdonow and team NoTrace Security Lab @NoTrace24657171 controlled #DLink DIR-878 successfully. There will be several other teams working on this target tomorrow. Let’s wait for the bonus result tomorrow.
— TianfuCup (@TianfuCup) November 16, 2019
The exploit on Ubuntu + #qemu-kvm achieved partially control of the host. A bonus of $80,000 was won by 360Vulcan @Xiaowei__ being the highest bounty for a single exploit in Day 1 #TFC.
— TianfuCup (@TianfuCup) November 16, 2019
Let’s wait for new success attempts for Day2.
[adrotate banner=”9″] | [adrotate banner=”12″] |
(
[adrotate banner=”5″]
[adrotate banner=”13″]