Saturday 15 February 2014

Pwn2Own : The greatest Hackers Reward Program

Pwn2Own is a computer hacking contest held annually at the CanSecWest security conference, beginning in 2007. Contestants are challenged to exploit widely used software and mobile devices with previously unknown vulnerabilities. Winners of the contest receive the device that they exploited, a cash prize, and a “Masters” jacket celebrating the year of their win. The name “Pwn2Own” is derived from the fact that contestants must “pwn” or hack the device in order to “own” or win it. The Pwn2Own contest serves to demonstrate the vulnerability of devices and software in widespread use while also providing a checkpoint on the progress made in security since the previous year.



Contest dates for the year 2014:

The contest will take place March 12-13 in Vancouver, British Columbia, at the CanSecWest 2014 conference. The schedule of contestants and platforms will be determined by random drawing at the conference venue and posted at Pwn2Own.com  prior to the start of competition.

Rules and prizes:

The 2014 competition consists of three divisions: Browsers, Plug-Ins, and the Grand Prize. All target machines will be running the latest fully patched versions of the relevant operating systems (Windows 8.1 x64 and OS X Mavericks), installed in their default configurations. The vulnerability or vulnerabilities used in each attack must be unknown and not previously reported to the vendor. A particular vulnerability can only be used once across all categories.

The first contestant to successfully compromise a target within the 30-minute time limit wins the prize in that category.

The 2014 targets are:

Browsers:

Google Chrome on Windows 8.1 x64: $100,000

Microsoft Internet Explorer 11 on Windows 8.1 x64: $100,000

Mozilla Firefox on Windows 8.1 x64: $50,000

Apple Safari on OS X Mavericks: $65,000

Plug-ins:

Adobe Reader running in Internet Explorer 11 on Windows 8.1 x64: $75,000

Adobe Flash running in Internet Explorer 11 on Windows 8.1 x64: $75,000

Oracle Java running in Internet Explorer 11 on Windows 8.1 x64 (requires click-through bypass): $30,000

“Exploit Unicorn” Grand Prize:

SYSTEM-level code execution on Windows 8.1 x64 on Internet Explorer 11 x64 with EMET (Enhanced Mitigation Experience Toolkit) bypass: $150,000*

Check Complete details here

CanSecWest Applied Security Conference

ThankYou :)

No comments:

Post a Comment

Please add your valuable comments.We appreciate it.