Hackers beat Firefox and Safari to earn $105K at Pwn2Own

Zero-day exploits earned hackers $105,000 in total on Thursday during the second day of the Pwn2Own contest in Vancouver, British Columbia. Packed into a small basement room, a rapt crowd watched as Richard Zhu successfully hacked Firefox and gained control of the target computer to win $50,000 and clinch the overall victory for the competition. That in addition to his wins Wednesday, when he earned $70,000 successfully targeting Microsoft Edge with an exploit that took him almost a week of work to develop. Zhu, a veteran of the world class Carnegie Mellon University capture the flag (CTF) team as well as previous Pwn2Own competitions, had a particularly memorable run against Microsoft Edge when he debugged his exploit on the fly and on the clock, succeeding on his third and final attempt. It followed a three-strike failure when Zhu opened the contest with an unsuccessful attempt to hack Safari, Apple’s default browser. “I put a lot of work into […]

The post Hackers beat Firefox and Safari to earn $105K at Pwn2Own appeared first on Cyberscoop.

Continue reading Hackers beat Firefox and Safari to earn $105K at Pwn2Own

Capture the Flag Challenge is the Perfect Gift

Nothing says friendship like a reverse engineering challenge on unknown terrain as a birthday present. When [Rikaard] turned 25 earlier this year, his friend [Veydh] put together a Capture the Flag challenge on an ESP8266 for him. As a software guy with no electronics background, [Rikaard] had no idea what he was presented with, but was eager to find out and to document his journey.

Left without guidance or instructions, [Rikaard] went on to learn more about the ESP8266, with the goal to dump its flash content, hoping to find some clues in it. Discovering the board is running NodeMCU …read more

Continue reading Capture the Flag Challenge is the Perfect Gift

Hands on the Ethernaut CTF

Last week Zeppelin released their Ethereum CTF, Ethernaut. This CTF is a good introduction to discover how to interact with a blockchain and learn the basics of the smart contract vulnerabilities. The CTF is hosted on the ropsten blockchain, and you can receive free ethers for it. The browser developer console is used to interact […]

The post Hands on the Ethernaut CTF appeared first on Security Boulevard.

Continue reading Hands on the Ethernaut CTF

Larry’s Capture-the-Flag Scenario – Paul’s Security Weekly #527

Larry had a technical problem that he needed to solve. Larry demonstrates a new capture-the-flag scenario and how to capture a particular wireless packet in the middle of all the noise! Full Show Notes Subscribe to YouTube Channel

The post Larry’s Capture-the-Flag Scenario – Paul’s Security Weekly #527 appeared first on Security Weekly.

Continue reading Larry’s Capture-the-Flag Scenario – Paul’s Security Weekly #527

DARPA Challenges Hackers to Create Automated Hacking System — WIN $2 Million

Why we can’t detect all security loopholes and patch them before hackers exploit them?

Because… we know that humans are too slow at finding and fixing security bugs, which is why vulnerabilities like Heartbleed, POODLE and GHOST remained undetected for decades and rendered almost half of the Internet vulnerable to theft by the time patches were rolled out.

Now to solve this hurdle, DARPA

Continue reading DARPA Challenges Hackers to Create Automated Hacking System — WIN $2 Million

Facebook Open Sources its Capture the Flag (CTF) Platform

Hacking into computer, networks and websites could easily land you in jail. But what if you could freely test and practice your hacking skills in a legally safe environment?

Facebook just open-sourced its Capture The Flag (CTF) platform to encourage s… Continue reading Facebook Open Sources its Capture the Flag (CTF) Platform