• About
  • Advertise
  • Careers
  • Contact
Saturday, July 2, 2022
No Result
View All Result
NEWSLETTER
Cyber360 News
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us
No Result
View All Result
Cyber360 News
No Result
View All Result
Home Security

Pwn2Own 2020: Hacker Wins $30,000 For Ubuntu’s Privilege Escalation Bug

by Cyber360 News
March 20, 2020
in Security
0
Pwn2Own 2020: Hacker Wins $30,000 For Ubuntu’s Privilege Escalation Bug
0
SHARES
4
VIEWS
Share on FacebookShare on Twitter

Amidst the havoc wreaked by Coronavirus, the annual hacking event Pwn2Own is underway, and for the first time, the contest is being held remotely. At the Pwn2Own first day, several ethical hackers from all over the world participated and demonstrated their capabilities.

Pwn2Own 2020: Day 1

Manfred Paul of RedRocket team won $30,000 and 3 Master of Pwn points by successfully using an improper input validation bug to escalate privileges on a Ubuntu desktop. Paul is a newcomer to the annual hacking event and accomplished his goal in the very first attempt.

Confirmed! Manfred Paul of @redrocket_ctf used an improper input validation bug to escalate privileges on #Ubuntu Desktop. His first foray into #Pwn2Own nets him $30,000 and 3 Master of Pwn points. pic.twitter.com/nzLhyckDN7

— Zero Day Initiative (@thezdi) March 18, 2020

A team from Georgia Tech Systems Software and Security Lab won the maximum amount of $70,000 on the first day by targeting Apple Safari. They used a six bug chain to pop calc and escalate to root.

Last year’s winning champion team Fluorescence took home $40,000 by leveraging a UAF in Windows to escalate to SYSTEM.

Pwn2Own 2020: Day 2

On the second day of the event, Phi Phạm Hồng from STAR labs targeted Oracle Virtualbox with using an OOB Read for an info leak. He used an uninitialized variable for code execution on the hypervisor. Phi Pham Hong won $40,000 for it.

Synacktiv team of Corentin Bayet and Bruno Pujos failed to demonstrate their exploit in which they were supposed to target the VMware Workstation in the virtualization category in the provided time.

Cyber360 News

Cyber360 News

Next Post
Drupal addresses two XSS flaws by updating the CKEditor

Drupal addresses two XSS flaws by updating the CKEditor

Recent Posts

Twitch’s Entire Critical Data Leaked, Includes Streamer Earnings, Source Code

Twitch’s Entire Critical Data Leaked, Includes Streamer Earnings, Source Code

October 6, 2021
Former U.S. Security Firm Helped The UAE Carry Out “Karma” iMessage Hack: MIT Tech Review

Former U.S. Security Firm Helped The UAE Carry Out “Karma” iMessage Hack: MIT Tech Review

October 1, 2021
Facing “This App Has Been Blocked For Your Protection” Issue? Here’s How You Can Fix It

Facing “This App Has Been Blocked For Your Protection” Issue? Here’s How You Can Fix It

October 1, 2021

Whats New in Kali Linux?

September 14, 2021

Kali Linux 2019.3 Release (CloudFlare, Kali-status, metapackages, Helper-Scripts & LXD)

September 14, 2021

Kali Linux 2021.3 Release (OpenSSL, Kali-Tools, Kali Live VM Support, Kali NetHunter Smartwatch)

September 14, 2021

Kali Linux 2018.4 Release

September 14, 2021

Kali Linux 1.0.5 and Software Defined Radio

September 14, 2021

Kali Tools Website Launched, 1.0.9 Release

September 14, 2021

Kali Linux Dojo at Black Hat Vegas 2016

September 14, 2021

Category

Site Links

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

About Us

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Check our landing page for details.

© 2019 Cyber360 News - Powered by WebSensePro

No Result
View All Result
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us

© 2019 Cyber360 News - Powered by WebSensePro

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In