Page 1 of 1

Pwn2Own Competition: Hack a laptop and you can keep it!

Posted: 25 Mar 2008, 08:06
by hamin_aus
www.theregister.co.uk wrote:
Tired of all the knee-jerk banter from fanboys about whose operating system is the most secure? So are the organizers of the CanSecWest security conference, which will be held in Vancouver later this month. And with a contest awarding as much as $25,000 worth of prizes, they're likely to breathe fresh life into a stale debate.

This year's Pwn2Own competition will place three brand-new, fully patched laptops side by side: a Fujitsu U810 running Vista Ultimate, a Vaio VGN-TZ37Cn running Ubuntu 7.10 and a MacBook Air running Leopard. The first person to remotely run code on each one gets to take the machine home, and is automatically entered into the running for a $25,000 award from TippingPoint, whose Zero Day Initiative pays bounties to researchers for responsibly disclosing vulnerabilities.

At last year's Pwn2Own contest, conference organizers challenged attendees to hack into one of two fully patched MacBookPros to claim the machine and a $10,000 bounty from TippingPoint. Security guru Dino Dai Zovi, spent less than 12 hours doing just that, crafting a QuickTime exploit that allowed him to take complete control of the machine.

CanSecWest's Pwn2Own contests are useful because they allow us to isolate the technical strengths and weaknesses of a given platform from its popularity. Acrimonious debate has fomented for years about whether the high number of real-world Windows exploits - compared to those of OS X, Linux and other operating systems - is a natural consequence of having a 90-percent chunk of the market or the result of sloppy and insecure coding practices at Microsoft.

There's at least some merit to the argument that organized cyber crime gangs - just like makers of popular games Half-Life 2 and Crysis - don't write for the Mac and Linux because the smaller market shares make it impossible to get a return on the investment. The Pwn2Own contest, by offering a considerable incentive for exploits of these platforms, helps to neutralize the economic variable.

"These computers are REAL and FULLY patched," conference organizer Dragos Ruiu wrote in an email announcing the rules. "All third party software is widely used. There are no imitation vulnerabilities. Any exploit successfully used in this contest would also compromise a significant percentage of the internet connected hosts."

The rules for this year's contest include:
  • Limit one laptop per contestant
  • The same vulnerability can't be used against more than one box
  • Attacks will be performed using a cross-over cable (with the attacker controlling the default route) or using radio-frequency by special arrangement.
  • Winning exploits must target a previously unknown vulnerability; vulns that have already been reported to the affected software maker or a third party are not eligible.
Each of the machines will include widely deployed applications, including web browsers (Internet Explorer, Safari, Konqueror and Firefox), instant messengers (AIM, MSN, Yahoo, Adium, Skype and Pigdin) and email clients (Outlook, Mail.app, Thunderbird, kmail, mutt).

Posted: 25 Mar 2008, 08:28
by Synthesis
Who dares me to run in with a stocking over my head and a realistic water pistol, stealing all 3 machines.
Bet that's an original exploit they didn't expect! :lol:

Posted: 25 Mar 2008, 09:18
by Vampyre_2099
Synthesis that would be awesome

Posted: 28 Mar 2008, 07:15
by rustypup
Macintosh Notebook 'Air' gone in 120seconds yes, i don't play the wetard apple-contraction-marketing game... i'm surprised they managed to avoid shoving a lowercase 'i' in ther... ooo... sneaky sods...

Posted: 28 Mar 2008, 11:29
by GreyWolf
bwahahahah! stupid mac...

check out www.theregister.co.uk

they reported on this, and all th mac fanboys are coming up with excuses...

Posted: 28 Mar 2008, 21:48
by Anakha56
:lol:

So the mac dies first! Microsoft must be happy about that :P :lol:

Posted: 08 Apr 2008, 14:44
by rustypup
the results were pretty decisive... Ubuntu came through without a scratch......

Posted: 08 Apr 2008, 15:26
by Acidkidsa
Give me a panga , I will hacking in a split second..

Posted: 08 Apr 2008, 15:42
by hamin_aus
As of today, since the Vista and Ubuntu laptops are still standing unscathed, we are now opening up the scope beyond just default installed applications on those laptops; any popular 3rd party application (as deemed "popular" by the judges) can now be installed on the laptops
So if A "popular" 3RD PARTY app is installed and creates an exploitable security vulnerability it is still Microsofts fault :?:

No, rather, I think this was a ploy to get results one way or another.

If for EG you exploit a bug in Winamp to mess up a PC, it is Nullsoft which should be accountable.

Also, lets not forget how many "popular" Windows apps there are, compared to the pitifully few apps of any popularity for Linux.

Posted: 08 Apr 2008, 15:53
by rustypup
:lol: would you like some cheese with that?

considering the exploits which succeded, buffer overruns should not be happening anymore... how difficult is it to implement boundary checking? it is, after all, 2008...

Posted: 08 Apr 2008, 16:04
by hamin_aus
They continually change the rules of the game until they get the results they want.
We had a term for that on the playground. We called it squealing.

Whether it was Windows or Linux which buckled first, my point stands.
3rd Party apps inherently create vulnerabilities.

Posted: 08 Apr 2008, 17:28
by rustypup
jamin_za wrote:3rd Party apps inherently create vulnerabilities.
i stand corrected, sir..

Note to all Windows users: Installing any software whatsoever on your newly purchased Windows PC will void any and all warranties and may cause the system to become insecure.

Just stare at the pretty desktop. That's what it's there for.... :lol:

Posted: 08 Apr 2008, 17:41
by WiK1d
Did 3rd party apps make linux budge?

Re: Pwn2Own Competition: Hack a laptop and you can keep it!

Posted: 15 Mar 2011, 08:24
by Stuart
Washington Post wrote:Pwn2Own — an annual computer-security contest in which researchers vie to win cash prizes and computer hardware by exploiting Web browsers — ended last week, and the results may surprise you.

The first browser to get hacked was Apple’s Safari. As Ars Technica’s Peter Bright wrote on Thursday, the almost-current 5.0.3. version of Safari, running on an up-to-date copy of Mac OS X 10.6.6, succumbed to a malicious page written by researchers with VUPEN, a French security firm, in a few seconds.

They proved the attack by remotely launching the Mac’s Calculator program and writing a file to the MacBook Air’s flash drive — earning them the right to keep the laptop, as per the contest’s rules.

Microsoft’s Internet Explorer 8, running on Windows 7 updated with Service Pack 1, fell later that day. Bright’s report notes that the IE 8 hack involved more exploits and took five to six weeks to construct, against two for the Safari exploit.

On the second day of Pwn2Own (organized by HP’s Austin-based TippingPoint DVLabs subsidiary and held at the CanSecWest conference in Vancouver every year), the iPhone 4 and a BlackBerry Torch smartphone also suffered successful hacks. Although the iPhone 4 was not running Apple’s just-released iOS 4.3 — the contest rules only required that the target device be running software current as of the week before — the vulnerability exploited in the attack exists in 4.3, too.

Over both days, nobody even tried to challenge Google’s Chrome (even though Google offered a separate cash award to anybody who could hack Chrome), Mozilla Firefox, a Nexus S smartphone running Google’s Android 2.3 operating system or a Dell Venue Pro with Microsoft’s Windows Phone 7.

More

Re: Pwn2Own Competition: Hack a laptop and you can keep it!

Posted: 16 Mar 2011, 20:36
by Anakha56
:lol: And yet again Apple shows that they are more secure than Microsoft, it took longer to make to boot :roll:...

I love these comps puts all fanbois in place... :P

Re: Pwn2Own Competition: Hack a laptop and you can keep it!

Posted: 16 Mar 2011, 21:06
by Sojourn
Anakha56 wrote::lol: And yet again Apple shows that they are more secure than Microsoft, it took longer to make to boot :roll:...

I love these comps puts all fanbois in place... :P
sarcasm or brain faster than fingers?

Re: Pwn2Own Competition: Hack a laptop and you can keep it!

Posted: 16 Mar 2011, 21:08
by Anakha56
You decide ;). The lol is meant to be on top but yes sarcasm...