×

Warning

JUser: :_load: Unable to load user with ID: 63
Friday, 28 March 2008 04:14

Three-way hack fest

By
Want to win a notebook? Head west quickly, young man.

The annual CanSecWest conference, currently running in Vancouver, Canada features the PWN2OWN 2008 competition which gives attendees the chance to win a Sony Vaio VGN-TZ37CN (Ubuntu 7.10), a Fujitsu U810 (Vista Ultimate SP1) or a MacBook Air (Mac OS X 10.5.2).

How does the competition work? "You hack it, you get to keep it." The task set is to extract a specific file from the chosen system via the Ethernet port (RF attacks are acceptable "by special arrangement"). Each system is patched and in a "typical" configuration, and successful completion will require the execution of code on the laptop.

Contestants have just 30 minutes to do the deed, and they have no physical access to the targets.

All three systems survived the first day of the competition, which limited attacks to "Remotely exploitable Pre-Auth vulnerabilities which require no user interaction." That meant TippingPoint's $20,000 cash prize was safe.

The second day widened the scope to "any default installed client-side applications which can be exploited by following a link through email, vendor supplied IM client or visiting a malicious website."

CONTINUED


The MacBook Air was the first to fall. Charlie Miller, Jake Honoroff and Mark Daniel from Independent Security Evaluators exploited a newly discovered vulnerability in Safari to win the Apple notebook plus $10,000 cash.

Details of the vulnerability will not be published until Apple releases a patch. Even if the vulnerability is also present in the Windows version of Safari, competition rules mean it cannot now be used to win the Fujitsu. That suggests that the ISE team wanted to win the MacBook Air rather than the Windows notebook - a possibility that is borne out by the fact that the winning attack was carried out from a MacBook.

The third day will add a selection of popular third-party programs to the mix, with the cash prize dropping to $5000.
Read 4928 times

Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here
BACK TO LATEST NEWS here




Maximising Cloud Efficiency - LUMEN WEBINAR 23 April 2025

According to KPMG, companies typically spend 35% more on cloud than is required to deliver business objectives

The rush to the cloud has led to insufficient oversight, with many organisations struggling to balance the value of cloud agility and innovation against the need for guardrails to control costs.

Join us for an exclusive webinar on Cloud Optimisation.

In this event, the team from Lumen will explain how you can maximise cloud efficiency while reducing cost.

The session will reveal how to implement key steps for effective cloud optimisation.

Register for the event now!

REGISTER!

PROMOTE YOUR WEBINAR ON ITWIRE

It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://itwire.com/itwire-update.html and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV https://www.youtube.com/c/iTWireTV/videos which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.

MORE INFO HERE!

BACK TO HOME PAGE
Stephen Withers

Stephen Withers is one of Australia¹s most experienced IT journalists, having begun his career in the days of 8-bit 'microcomputers'. He covers the gamut from gadgets to enterprise systems. In previous lives he has been an academic, a systems programmer, an IT support manager, and an online services manager. Stephen holds an honours degree in Management Sciences and a PhD in Industrial and Business Studies.

Share News tips for the iTWire Journalists? Your tip will be anonymous

Subscribe to Newsletter

*  Enter the security code shown: img0

CYBERSECURITY

PEOPLE MOVES

GUEST ARTICLES

Guest Opinion

ITWIRETV & INTERVIEWS

RESEARCH & CASE STUDIES

Channel News

Comments