Free Republic
Browse · Search
General/Chat
Topics · Post Article

These vulnerabilities and exploits represent months of work for the hackers who demonstrate them and are not the effort of just a few minutes at the conference. The code used and flaws will be disclosed to the publishers responsible so the flaws can be quickly closed before publication.


3 posted on 03/18/2016 2:17:10 AM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
[ Post Reply | Private Reply | To 2 | View Replies ]


To: Swordmaker

Just another “overnight success”....


4 posted on 03/18/2016 2:36:55 AM PDT by Paladin2
[ Post Reply | Private Reply | To 3 | View Replies ]

Day 1: The Details
  1. JungHoon Lee (lokihardt): Demonstrated a successful code execution attack against Apple Safari to gain root privileges. The attack consisted of four new vulnerabilities: a use-after-free vulnerability in Safari and three additional vulnerabilities, including a heap overflow to escalate to root. This demonstration earned 10 Master of Pwn points and US$60,000.
  2. 360Vulcan Team: Demonstrated a successful code execution attack against Adobe Flash using a Flash confusion bug with use-after-free vulnerability in the Windows Kernel to run code in the SYSTEM context. This demonstration earned 13 Master of Pwn points and US$80,000.
  3. Tencent Security Team Shield (PC Manager and KeenLab): Demonstrated a successful code execution attack against Apple Safari to gain root privileges using two use-after-free vulnerabilities, one in Safari and the other in a privileged process. This demonstration earned 10 Master of Pwn points and US$40,000.
  4. 360Vulcan Team: Demonstrated a successful code execution attack against Google Chrome in the SYSTEM context. The attack used four vulnerabilities: two use-after-free vulnerabilities in Adobe Flash, one use-after-free vulnerability in the Windows Kernel and an out-of-bounds vulnerability in Google Chrome. This was a partial win due to the Google Chrome vulnerability being a duplicate of a previous, independent report to Google. This demonstration earned 12 Master of Pwn points and US$52,500.
  5. Tencent Security Team Sniper (KeenLab and PC Manager): Demonstrated a successful code execution attack against an out-of-bounds vulnerability in Adobe Flash that use an infoleak vulnerability and a use-after-free vulnerability in the Windows Kernel to achieve SYSTEM context. This demonstration earned 13 Master of Pwn points and US$50,000.
  6. Tencent Xuanwu Lab: Adobe Flash in Microsoft Edge: This attempt failed.

5 posted on 03/18/2016 3:52:22 AM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
[ Post Reply | Private Reply | To 3 | View Replies ]

To: Swordmaker
> The code used and flaws will be disclosed to the publishers responsible so the flaws can be quickly closed before publication.

That's the responsible way for a hacker to do it. Kudos, not only on their months of research work, but also on their ethics.

6 posted on 03/18/2016 4:45:44 AM PDT by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 3 | View Replies ]

To: Swordmaker

And of course- where are the testing criteria listed? What specific devices are being “hacked”? What is turned on or off in the built-in and default security settings? Are the hackers given direct access to the devices?

I’m all about security - but some of these “tests” in the past really were more about social engineering (like so many Windows-based exploits) than actual flaws.

Inquiring minds want to know...


7 posted on 03/18/2016 9:12:22 AM PDT by TheBattman (Isn't the lesser evil... still evil?)
[ Post Reply | Private Reply | To 3 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson