These vulnerabilities and exploits represent months of work for the hackers who demonstrate them and are not the effort of just a few minutes at the conference. The code used and flaws will be disclosed to the publishers responsible so the flaws can be quickly closed before publication.
3 posted on
03/18/2016 2:17:10 AM PDT by
Swordmaker
(This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
To: Swordmaker
Just another “overnight success”....
4 posted on
03/18/2016 2:36:55 AM PDT by
Paladin2
Day 1: The Details
- JungHoon Lee (lokihardt): Demonstrated a successful code execution attack against Apple Safari to gain root privileges. The attack consisted of four new vulnerabilities: a use-after-free vulnerability in Safari and three additional vulnerabilities, including a heap overflow to escalate to root. This demonstration earned 10 Master of Pwn points and US$60,000.
- 360Vulcan Team: Demonstrated a successful code execution attack against Adobe Flash using a Flash confusion bug with use-after-free vulnerability in the Windows Kernel to run code in the SYSTEM context. This demonstration earned 13 Master of Pwn points and US$80,000.
- Tencent Security Team Shield (PC Manager and KeenLab): Demonstrated a successful code execution attack against Apple Safari to gain root privileges using two use-after-free vulnerabilities, one in Safari and the other in a privileged process. This demonstration earned 10 Master of Pwn points and US$40,000.
- 360Vulcan Team: Demonstrated a successful code execution attack against Google Chrome in the SYSTEM context. The attack used four vulnerabilities: two use-after-free vulnerabilities in Adobe Flash, one use-after-free vulnerability in the Windows Kernel and an out-of-bounds vulnerability in Google Chrome. This was a partial win due to the Google Chrome vulnerability being a duplicate of a previous, independent report to Google. This demonstration earned 12 Master of Pwn points and US$52,500.
- Tencent Security Team Sniper (KeenLab and PC Manager): Demonstrated a successful code execution attack against an out-of-bounds vulnerability in Adobe Flash that use an infoleak vulnerability and a use-after-free vulnerability in the Windows Kernel to achieve SYSTEM context. This demonstration earned 13 Master of Pwn points and US$50,000.
- Tencent Xuanwu Lab: Adobe Flash in Microsoft Edge: This attempt failed.
5 posted on
03/18/2016 3:52:22 AM PDT by
Swordmaker
(This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
To: Swordmaker
>
The code used and flaws will be disclosed to the publishers responsible so the flaws can be quickly closed before publication. That's the responsible way for a hacker to do it. Kudos, not only on their months of research work, but also on their ethics.
6 posted on
03/18/2016 4:45:44 AM PDT by
dayglored
("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
To: Swordmaker
And of course- where are the testing criteria listed? What specific devices are being “hacked”? What is turned on or off in the built-in and default security settings? Are the hackers given direct access to the devices?
I’m all about security - but some of these “tests” in the past really were more about social engineering (like so many Windows-based exploits) than actual flaws.
Inquiring minds want to know...
7 posted on
03/18/2016 9:12:22 AM PDT by
TheBattman
(Isn't the lesser evil... still evil?)
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson