During Day 1 of the Tianfu Cup 2019 contest 13 hacking attempts out of a total of 32 were successful, 13 attempts failed and in 12 cases the researchers abandoned the attempts. Now that the competition is ended, let’s see what has happened during the two days.
Some number reviews for the two-day #TFC 2019 PWN contest:
— TianfuCup (@TianfuCup) November 17, 2019
17 teams delivered 28 on-site demonstrations with 20 successful and 8 failed
11 teams have gained bonus
8 targets been taken down
Total bounty of $545,000 awarded!
Thanks everyone for participating! pic.twitter.com/k9voEyNHlg
White hat hackers have attempted to test their exploits on targeting VMware, Microsoft, Google, Apple, D-Link, and Adobe products and earned a total of $545,000 for working zero-day exploits.
Researcher @xiaowei from the 360Vulcan team received the highest reward ($200,000) for a working exploit for the VMware vSphere ESXi product that allowed them to escape from the guest virtual machine to the host.
Verified to be a success! Congrats to 360Vulcan @XiaoWei__ on wining $200,000 – the highest bonus of #TFC 2019! https://t.co/xYqlhMJj7W
— TianfuCup (@TianfuCup) November 17, 2019
The 360Vulcan team won the competition and received a total of $382,500 for their exploits, the second place was assigned to the ddd Team that earned a total of $83,750 for exploits targeting Edge, Chrome, Adobe Reader, and D-Link routers.
The participants belonging to 11 teams made 20 successful attempts against eight products, which earned them a total of $545,000. Last year, white hat hackers earned more than $1 million for
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – Tianfu Cup 2019, hacking)
[adrotate banner=”5″]
[adrotate banner=”13″]