Pwn2Own hack contest puts record $645K on prize table
New grand prize of $150,000 requires researchers to deal with Microsoft's EMET anti-exploit toolkit
Computerworld - Hewlett-Packard's Zero Day Initiative (ZDI) yesterday spelled out the rules for its March hacking contest, Pwn2Own, which will put two-thirds of a million dollars in prize money on the table for researchers who can hack the biggest browsers and most popular plug-ins.
ZDI is HP's bug-bounty program, run by its TippingPoint division, a maker of intrusion prevention system (IPS) and firewall appliances for corporate networks.
The 2014 edition of Pwn2Own will offer $645,000 in potential awards to hackers who demonstrate exploits of previously-unknown vulnerabilities in Google's Chrome, Mozilla's Firefox, Microsoft's Internet Explorer (IE) or Apple's Safari, or the Adobe Reader, Adobe Flash or Oracle Java browser plug-ins.
Those targets were also the focus of last year's challenge.
Prizes will be awarded on a sliding schedule, with $100,000 for the first to hack Chrome or IE11 on Windows 8.1. Payments will drop to $75,000 for Adobe Flash or Reader running in IE11, then slide through other targets before ending at $30,000 for Java. Prizes will also be given for exploiting Safari ($65,000) and Firefox ($50,000).
A new $150,000 prize will also be at stake for what HP called the "Exploit Unicorn," a multi-exploit string able to not only hack IE11 on Windows 8.1, but also obtain system-level code execution when Microsoft's Enhanced Mitigation Experience Toolkit (EMET), a utility that manually enables anti-exploit technologies such as ASLR (address space layout randomization) and DEP (data execution prevention) for specific applications, is enabled.
"We're trying to highlight the prowess of the best researchers in the world," said Brian Gorenc, manager of vulnerability research for ZDI, in an interview Friday, referring to the grand prize. "We know that researchers are looking at this [EMET], and we wanted to make this extra difficult."
To grab the $150,000, researchers will have to bypass IE11's "sandbox," a defensive technology that isolates the browser from the rest of the operating system, then leverage at least one additional vulnerability to gain system access -- all while EMET is in action.
While Gorenc acknowledged that the addition of EMET is in part an artificial hurdle designed to make exploitation more difficult, there's some method to the madness: Microsoft has increasingly pitched EMET, even to individual users, as a stop-gap defense to use between the time a new vulnerability has been discovered and when the bug is patched.
Pwn2Own, which is in its eighth year, will run March 12-13 at the CanSecWest security conference in Vancouver, British Columbia. Google will also be running its own Pwnium contest -- which will pit researchers against its Chrome OS -- at CanSecWest, and will be kicking in 25% of the prize money for Pwn2Own.
This year's Pwn2Own will again use a random drawing to choose the order that researchers tackle a target. Each researcher or team of researchers will have 30 minutes to demonstrate their exploit. If successful, the prize money will be awarded and researchers who didn't get a favorable draw will be out of luck.
"The #Pwn2own random drawing shit is back this year, a very bad rule that was removed last year where all pwners were allowed to pwn," said Chaouki Bekrar, CEO of French vulnerability research lab and zero-day seller Vupen, in a tweet yesterday.
Actually, Pwn2Own used the drawing in 2013, but during the challenge the prize pool was expanded to give every successful exploit the winning prize money, which resulted in several earning $20,000 each for hacking Java.
Gorenc said the same may happen at this year's contest, depending on how many register for the contest.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The Threat Landscape Hardly a day goes by without the discovery of a new cyberthreat somewhere in the world! But how do you keep up with...
- Security for Virtualization In the rush to implement virtualization, security has become second. So while the business benefits are clear, the risks are less well documented...
- HP HAVEn: See the big picture in Big Data HP HAVEn is the industry's first comprehensive, scalable, open, and secure platform for Big Data. Enterprises are drowning in a sea of data...
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,... All Malware and Vulnerabilities White Papers | Webcasts