Pwnium
   HOME

TheInfoList



OR:

Pwn2Own is a
computer hacking A hacker is a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means. Though the term ''hacker'' has become associated in popu ...
contest held annually at the CanSecWest security conference. First held in April 2007 in Vancouver, the contest is now held twice a year, most recently in April 2021. Contestants are challenged to
exploit Exploit means to take advantage of something (a person, situation, etc.) for one's own end, especially unethically or unjustifiably. Exploit can mean: *Exploitation of natural resources *Exploit (computer security) * Video game exploit *Exploitat ...
widely used
software Software is a set of computer programs and associated software documentation, documentation and data (computing), data. This is in contrast to Computer hardware, hardware, from which the system is built and which actually performs the work. ...
and mobile devices with previously unknown vulnerabilities. Winners of the contest receive the device that they exploited and a cash prize. The Pwn2Own contest serves to demonstrate the vulnerability of devices and software in widespread use while also providing a checkpoint on the progress made in security since the previous year.


History


Origins

The first contest in 2007 was conceived and developed by Dragos Ruiu in response to his frustration with
Apple Inc. Apple Inc. is an American multinational technology company headquartered in Cupertino, California, United States. Apple is the largest technology company by revenue (totaling in 2021) and, as of June 2022, is the world's biggest company ...
's lack of response to the Month of Apple Bugs and the Month of Kernel Bugs, as well as Apple's television commercials that trivialized the security built into the competing Windows operating system. At the time, there was a widespread belief that, despite these public displays of vulnerabilities in Apple products, OS X was significantly more secure than any other competitors. On March 20, roughly three weeks before CanSecWest that year, Ruiu announced the Pwn2Own contest to security researchers on the DailyDave mailing list. The contest was to include two MacBook Pros that he would leave on the conference floor hooked up to their own
wireless access point In computer networking, a wireless access point (WAP), or more generally just access point (AP), is a networking hardware device that allows other Wi-Fi devices to connect to a wired network. As a standalone device, the AP may have a wired ...
. Any conference attendee that could connect to this wireless access point and exploit one of the devices would be able to leave the conference with that laptop. There was no monetary reward. The name "Pwn2Own" was derived from the fact that contestants must "
pwn Leet (or "1337"), also known as eleet or leetspeak, is a system of modified spellings used primarily on the Internet. It often uses character replacements in ways that play on the similarity of their glyphs via reflection or other resemblance. ...
" or hack the device in order to "own" or win it. On the first day of the conference in
Vancouver, British Columbia Vancouver ( ) is a major city in western Canada, located in the Lower Mainland region of British Columbia. As the most populous city in the province, the 2021 Canadian census recorded 662,248 people in the city, up from 631,486 in 2016. The ...
, Ruiu asked Terri Forslof of the Zero Day Initiative (ZDI) to participate in the contest. ZDI has a program which purchases zero-day attacks, reports them to the affected vendor and turns them into signatures for their own network intrusion detection system, increasing its effectiveness. The vulnerabilities sold to ZDI are made public only after the affected vendor has issued a patch for it. Forslof agreed to have ZDI offer to purchase any vulnerabilities used in the contest for a flat price of $10,000. The first contest subsequently exposed a high-profile QuickTime flaw, which was disclosed to Apple on April 23 and patched in early May. In 2008 the scope of the Pwn2Own contest was expanded. Targets included three laptops running the default installation of
Windows Vista Windows Vista is a major release of the Windows NT operating system developed by Microsoft. It was the direct successor to Windows XP, which was released five years before, at the time being the longest time span between successive releases of ...
, OS X, or
Ubuntu Linux Ubuntu ( ) is a Linux distribution based on Debian and composed mostly of free and open-source software. Ubuntu is officially released in three editions: '' Desktop'', ''Server'', and ''Core'' for Internet of things devices and robots. Al ...
. Mobile devices were added in 2009. For 2012 the rules were changed to a capture-the-flag style competition with a point system, At and Chrome was successfully exploited for the first time, by regular competitor VUPEN. After withdrawing from the contest that year due to new disclosure rules, in 2013
Google Google LLC () is an American Multinational corporation, multinational technology company focusing on Search Engine, search engine technology, online advertising, cloud computing, software, computer software, quantum computing, e-commerce, ar ...
returned as a sponsor and the rules were changed to require full disclosure of exploits and techniques used. In that year(2013) a single researcher was able to hack Chrome,
Firefox Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation. It uses the Gecko rendering engine to display web pages, which implements current ...
and IE, a trifecta hack. Google ceased to be a sponsor of Pwn2Own in 2015.


Recent years

In 2015, every web browser tested was successfully hacked and every prize won, totaling $557,500. Other prizes such as laptops were also given to winning researchers. In 2018, the conference was much smaller and sponsored primarily by
Microsoft Microsoft Corporation is an American multinational technology corporation producing computer software, consumer electronics, personal computers, and related services headquartered at the Microsoft Redmond campus located in Redmond, Washin ...
, after China banned its security researchers from participating in the contest. Pwn2Own continues to be sponsored by
Trend Micro is an American-Japanese multinational cyber security software company with global headquarters in Tokyo, Japan and Irving, Texas, United State.Other regional headquarters and R&D centers are located around East Asia, Southeast Asia, Europe, and ...
's Zero Day Initiative, with ZDI reporting vulnerabilities to vendors before going public with the hacks. "One of the largest hacking contests in the world" according to
TechCrunch TechCrunch is an American online newspaper focusing on high tech and startup companies. It was founded in June 2005 by Archimedes Ventures, led by partners Michael Arrington and Keith Teare. In 2010, AOL acquired the company for approximately $ ...
, as of 2019 the contest continues to be held several times a year. Pwn2Own Tokyo was held November 6 to November 7 in
Tokyo, Japan Tokyo (; ja, 東京, , ), officially the Tokyo Metropolis ( ja, 東京都, label=none, ), is the capital and largest city of Japan. Formerly known as Edo, its metropolitan area () is the most populous in the world, with an estimated 37.468 ...
, and was expected to hand out $750,000 in cash and prizes. Hacks focus on browsers, virtual machines, computers, and phones. In 2019, the contest added cars for the first time, with $900,000 offered for hacks exploiting Tesla software. In 2019, the contest added industrial control systems.


Award system

Winners of the contest receive the device that they exploited and a cash prize. Winners also receive a "Masters" jacket celebrating the year of their win.


List of successful exploits

The following list of notable hacks is incomplete.


Yearly contests


2007

The contest took place from Thursday, April 18 to Saturday, April 20, 2007, in Vancouver. The first contest was intended to highlight the insecurity of Apple's
Mac OS X macOS (; previously OS X and originally Mac OS X) is a Unix operating system developed and marketed by Apple Inc. since 2001. It is the primary operating system for Apple's Mac computers. Within the market of desktop and la ...
operating system since, at the time, there was a widespread belief that OS X was far more secure than its competitors. Concerning rules, only two MacBook Pro laptops, one 13" and one 15", were left on the conference floor at CanSecWest and joined to a separate wireless network. Only certain attacks were allowed and these restrictions were progressively loosened over the three days of the conference. Day 1 allowed remote attacks only, day 2 had browser attacks included, while day 3 allowed local attacks, where contestants could connect with a
USB Universal Serial Bus (USB) is an industry standard that establishes specifications for cables, connectors and protocols for connection, communication and power supply (interfacing) between computers, peripherals and other computers. A broad ...
stick or
Bluetooth Bluetooth is a short-range wireless technology standard that is used for exchanging data between fixed and mobile devices over short distances and building personal area networks (PANs). In the most widely used mode, transmission power is limi ...
. In order to win the 15" MacBook Pro, contestants would be required to further escalate their privileges to
root In vascular plants, the roots are the organs of a plant that are modified to provide anchorage for the plant and take in water and nutrients into the plant body, which allows plants to grow taller and faster. They are most often below the su ...
after gaining access with their initial exploit. The laptops were not hacked on the first day. After the $10,000 prize was announced by ZDI, Shane Macaulay called up former co-worker Dino Dai Zovi in New York and urged him to compete in the second day. In one night, Dai Zovi found and exploited a previously unknown vulnerability in a QuickTime library loaded by Safari. The following morning, Dai Zovi sent his exploit code to Macaulay, who placed it on a website and e-mailed the contest organizers a link to it. When clicked, the link gave Macauley control of the laptop, winning the contest by proxy for Dai Zovi, who gave Macaulay the 15" MacBook Pro. Dai Zovi separately sold the vulnerability to ZDI for the $10,000 prize.


2008

Pwn2Own 2008 took place from Thursday, March 26 to Saturday, March 28, 2008. After the successful 2007 contest, the scope of the contest expanded to include a wider array of operating systems and browsers. The contest would demonstrate the widespread insecurity of all software in widespread use by consumers. Dragos refined the contest with the help of a wide panel of industry experts and the contest was administered by ZDI, who would again offer to purchase the vulnerabilities after their demonstration. As with all the vulnerabilities that ZDI purchases, the details of the vulnerabilities used in Pwn2Own would be provided to the affected vendors and public details would be withheld until a
patch Patch or Patches may refer to: Arts, entertainment and media * Patch Johnson, a fictional character from ''Days of Our Lives'' * Patch (''My Little Pony''), a toy * "Patches" (Dickey Lee song), 1962 * "Patches" (Chairmen of the Board song) ...
was made available. All contestants who successfully demonstrated exploits at the contest could sell their vulnerabilities to ZDI for prizes of $20,000 on the first day, $10,000 on the second day, and $5,000 on the third day. As in the previous year's contest, only certain attacks were allowed on each day. Targets included three laptops running the default installation of Windows Vista Ultimate SP1, Mac OS X 10.5.2, or Ubuntu Linux 7.10. Day 1 saw remote attacks only; contestants had to join the same network as the target laptop and perform their attack without user interaction and without authentication. Day 2 had browser and
Instant messaging Instant messaging (IM) technology is a type of online chat allowing real-time text transmission over the Internet or another computer network. Messages are typically transmitted between two or more parties, when each user inputs text and trigge ...
attacks included, as well as malicious website attacks with links sent to organizers to be clicked. Day 3 had third-party client applications included. Contestants could target popular third-party software such as browsers,
Adobe Flash Adobe Flash (formerly Macromedia Flash and FutureSplash) is a multimedia software platform used for production of animations, rich web applications, desktop applications, mobile apps, mobile games, and embedded web browser video players. Fla ...
,
Java Java (; id, Jawa, ; jv, ꦗꦮ; su, ) is one of the Greater Sunda Islands in Indonesia. It is bordered by the Indian Ocean to the south and the Java Sea to the north. With a population of 151.6 million people, Java is the world's mos ...
,
Apple Mail Apple Mail (officially known as Mail) is an email client included by Apple Inc. with its operating systems macOS, iOS, iPadOS and watchOS. Apple Mail grew out of NeXTMail, which was originally developed by NeXT as part of its NeXTSTEP operati ...
,
iChat iChat (previously iChat AV) is a discontinued instant messaging software application developed by Apple Inc. for use on its Mac OS X operating system. It supported instant text messaging over XMPP/Jingle or OSCAR ( AIM) protocol, audio and vid ...
,
Skype Skype () is a proprietary telecommunications application operated by Skype Technologies, a division of Microsoft, best known for VoIP-based videotelephony, videoconferencing and voice calls. It also has instant messaging, file transfer, deb ...
, AOL, and
Microsoft Silverlight Microsoft Silverlight is a discontinued application framework designed for writing and running rich web applications, similar to Adobe's runtime, Adobe Flash. A plugin for Silverlight is still available for a very small number of browsers. W ...
. Concerning outcome, the laptop running OS X was exploited on the second day of the contest with an exploit for the Safari browser co-written by
Charlie Miller Charles Miller (born 18 March 1976) is a Scottish retired footballer. He started his career at Rangers, and was voted the SPFA Young Player of the Year in 1995 during his time with the club. After spells with English Premier League clubs Lei ...
, Jake Honoroff and Mark Daniel of Independent Security Evaluators. Their exploit targeted an open-source subcomponent of the Safari browser. The laptop running Windows Vista SP1 was exploited on the third day of the contest with an exploit for
Adobe Flash Adobe Flash (formerly Macromedia Flash and FutureSplash) is a multimedia software platform used for production of animations, rich web applications, desktop applications, mobile apps, mobile games, and embedded web browser video players. Fla ...
co-written by Shane Macaulay, Alexander Sotirov, and Derek Callaway. After the contest, Adobe disclosed that they had co-discovered the same vulnerability internally and had been working on a patch at the time of Pwn2Own. The laptop running
Ubuntu Ubuntu ( ) is a Linux distribution based on Debian and composed mostly of free and open-source software. Ubuntu is officially released in three editions: '' Desktop'', ''Server'', and ''Core'' for Internet of things devices and robots. All ...
was not exploited.


2009

Pwn2Own 2009 took place over the three days of CanSecWest from Thursday, March 18 to Saturday, March 20, 2009. After having considerably more success targeting web browsers than any other category of software in 2007, the third Pwn2Own focused on popular browsers used on consumer desktop operating systems. It added another category of mobile devices which contestants were challenged to hack via many remote attack vectors including email, SMS messages, and website browsing. All contestants who demonstrated successful exploits at the contest were offered rewards for the underlying vulnerabilities by ZDI, $5,000 for browser exploits and $10,000 for mobile exploits. Concerning web browser rules, browser targets were
Internet Explorer 8 Windows Internet Explorer 8 (IE8) is a web browser for Windows. It was released by Microsoft on March 19, 2009, as the eighth version of Internet Explorer and the successor to Internet Explorer 7. It was the default browser in Windows 7 (later def ...
, Firefox, and Chrome installed on a Sony Vaio running
Windows 7 Windows 7 is a major release of the Windows NT operating system developed by Microsoft. It was released to manufacturing on July 22, 2009, and became generally available on October 22, 2009. It is the successor to Windows Vista, released nearly ...
Beta and Safari and
Firefox Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation. It uses the Gecko rendering engine to display web pages, which implements current ...
installed on a MacBook running Mac OS X. All browsers were fully patched and in default configurations on the first day of the contest. As in previous years, the attack surface contest expanded over the three days. On day 1, contestants had to target functionality in the default browser without access to any plugins. On day 2, Adobe Flash, Java, Microsoft
.NET Framework The .NET Framework (pronounced as "''dot net"'') is a proprietary software framework developed by Microsoft that runs primarily on Microsoft Windows. It was the predominant implementation of the Common Language Infrastructure (CLI) until bein ...
, and QuickTime were included. On day 3, other popular third party plugins were included like
Adobe Reader Adobe Acrobat is a family of application software and Web services developed by Adobe Inc. to view, create, manipulate, print and manage Portable Document Format (PDF) files. The family comprises Acrobat Reader (formerly Reader), Acrobat (former ...
. Multiple winners per target were allowed, but only the first contestant to exploit each laptop would get it. Mobile device targets included
BlackBerry The blackberry is an edible fruit produced by many species in the genus ''Rubus'' in the family Rosaceae, hybrids among these species within the subgenus ''Rubus'', and hybrids between the subgenera ''Rubus'' and ''Idaeobatus''. The taxonomy ...
, Android, Apple iPhone 2.0 (
T-Mobile T-Mobile is the brand name used by some of the mobile communications subsidiaries of the German telecommunications company Deutsche Telekom AG in the Czech Republic ( T-Mobile Czech Republic), Poland ( T-Mobile Polska), the United States (T-Mobil ...
G1), Symbian (Nokia N95) and
Windows Mobile Windows Mobile is a discontinued family of mobile operating systems developed by Microsoft for smartphones and personal digital assistants. Its origin dated back to Windows CE in 1996, though Windows Mobile itself first appeared in 2000 as Pock ...
(
HTC Touch The HTC Touch, also known as the HTC P3450 or its codename the HTC Elf or the HTC Vogue for the CDMA variant, is a Windows Mobile 6-powered Pocket PC designed and manufactured by HTC. Its main, unique feature is a user interface named ''TouchFLO'' ...
) phones in their default configurations. As with the browser contest, the attack surface available to contestants expanded over three days. In order to prove that they were able to successfully compromise the device, contestants had to demonstrate they could collect sensitive data from the mobile device or incur some type of financial loss from the mobile device owner. On day 1, the device could receive SMS, MMS, and e-mail but messages could not be read. Wifi (if on by default), Bluetooth (if on by default), and radio stack were also in-scope. On day 2, SMS, MMS, and e-mail could be opened and read. Wifi was turned on and Bluetooth could be turned on and paired with a nearby headset (additional pairing disallowed). Day 3 allowed one level of user interaction with the default applications. Multiple winners per device were allowed, but only the first contestant to exploit each mobile device would get it (along with a one-year phone contract). Concerning outcome, based on the increased interest in competing in 2009, ZDI arranged a random selection to determine which team went first against each target. The first contestant to be selected was
Charlie Miller Charles Miller (born 18 March 1976) is a Scottish retired footballer. He started his career at Rangers, and was voted the SPFA Young Player of the Year in 1995 during his time with the club. After spells with English Premier League clubs Lei ...
. He exploited Safari on OS X without the aid of any browser plugins. In interviews after winning the contest, Miller stressed that while it only took him minutes to run his exploit against Safari it took him many days to research and develop the exploit he used. A researcher identified only as Nils was selected to go after Miller. Nils successfully ran an exploit against Internet Explorer 8 on Windows 7 Beta. In writing this exploit, Nils had to bypass anti-exploitation mitigations that Microsoft had implemented in Internet Explorer 8 and Windows 7, including Data Execution Protection (DEP) and
Address Space Layout Randomization Address space layout randomization (ASLR) is a computer security technique involved in preventing exploitation of memory corruption vulnerabilities. In order to prevent an attacker from reliably jumping to, for example, a particular exploited f ...
(ASLR). Nils continued trying the other browsers. Although Miller had already exploited Safari on OS X, Nils exploited this platform again, then moved on to exploit Firefox successfully. Near the end of the first day, Julien Tinnes and Sami Koivu (remote) successfully exploited Firefox and Safari on OS X with a vulnerability in Java. At the time, OS X had Java enabled by default which allowed for reliable exploitation against that platform. However, due to having reported the vulnerabilities to the vendor already, Tinnes' participation fell outside the rules of the contest and was unable to be rewarded. The next days of the contest did not attract any additional contestants. Chrome, as well as all of the mobile devices, went unexploited in Pwn2Own 2009.


2010

The competition started at March 24, 2010 and had a total cash prize pool of US$100,000. On March 15—nine days before the contest was to begin—Apple released sixteen patches for
WebKit WebKit is a browser engine developed by Apple and primarily used in its Safari web browser, as well as on the iOS and iPadOS version of any web browser. WebKit is also used by the BlackBerry Browser, PlayStation consoles beginning from the P ...
and Safari. Concerning software to exploit, $40,000 of the $100,000 was reserved for web browsers, where each target is worth $10,000. Day 1 included Microsoft
Internet Explorer 8 Windows Internet Explorer 8 (IE8) is a web browser for Windows. It was released by Microsoft on March 19, 2009, as the eighth version of Internet Explorer and the successor to Internet Explorer 7. It was the default browser in Windows 7 (later def ...
on
Windows 7 Windows 7 is a major release of the Windows NT operating system developed by Microsoft. It was released to manufacturing on July 22, 2009, and became generally available on October 22, 2009. It is the successor to Windows Vista, released nearly ...
,
Mozilla Firefox 3.6 Mozilla Firefox 3.6 is a version of the Firefox web browser released in January 2010. The release's main improvement over Firefox 3.5 is improved performance (due to further speed improvements in the TraceMonkey JavaScript engine). It uses the Ge ...
on Windows 7, Google Chrome 4 on Windows 7, and Apple Safari 4 on
Mac OS X Snow Leopard Mac OS X Snow Leopard (version 10.6) is the seventh major release of macOS, Apple's desktop and server operating system for Macintosh computers. Snow Leopard was publicly unveiled on June 8, 2009 at Apple’s Worldwide Developers Conference. ...
. Day 2 included Microsoft Internet Explorer 8 on
Windows Vista Windows Vista is a major release of the Windows NT operating system developed by Microsoft. It was the direct successor to Windows XP, which was released five years before, at the time being the longest time span between successive releases of ...
, Mozilla Firefox 3 on Windows Vista, Google Chrome 4 on Windows Vista, and Apple Safari 4 on Mac OS X Snow Leopard. Day 3 included Microsoft Internet Explorer 8 on
Windows XP Windows XP is a major release of Microsoft's Windows NT operating system. It was released to manufacturing on August 24, 2001, and later to retail on October 25, 2001. It is a direct upgrade to its predecessors, Windows 2000 for high-end and ...
, Mozilla Firefox 3 on Windows XP, Google Chrome 4 on Windows XP, and Apple Safari 4 on Mac OS X Snow Leopard. $60,000 of the total $100,000 cash prize pool was allotted to the mobile phone portion of the contest, each target was worth $15,000. These included Apple iPhone 3GS, RIM BlackBerry Bold 9700,
Nokia E72 The Nokia E72 is a smartphone from the Nokia Eseries range manufactured in Finland. The Nokia E72 was announced on June 15, 2009 at the Nokia Connections 2009 event in Singapore.. It is the successor to the Nokia E71 and is based on a similar desig ...
device running Symbian, and
HTC HTC Corporation ( zh, t=宏達國際電子股份有限公司, s=宏达国际电子股份有限公司, p=Hóngdá Guójì Diànzǐ Gǔfèn Yǒuxiàn Gōngsī, first=t) or High Tech Computer Corporation, (literally ''Hongda International Electron ...
Nexus One The Nexus One (codenamed HTC Passion) is an Android smartphone designed and manufactured by HTC as Google's first Nexus smartphone. The Nexus became available on January 5, 2010, and features the ability to transcribe voice to text, an addition ...
running Android. The
Opera web browser Opera is a multi-platform web browser developed by its namesake company Opera. The browser is based on Chromium, but distinguishes itself from other Chromium-based browsers ( Chrome, Edge, etc.) through its user interface and other features. ...
was left out of the contests as a target: The ZDI team argued that Opera had a low market share and that Chrome and Safari are only included "due to their default presence on various mobile platforms". However, Opera's rendering engine, Presto, is present on millions of mobile platforms. Among successful exploits were when
Charlie Miller Charles Miller (born 18 March 1976) is a Scottish retired footballer. He started his career at Rangers, and was voted the SPFA Young Player of the Year in 1995 during his time with the club. After spells with English Premier League clubs Lei ...
successfully hacked Safari 4 on Mac OS X. Nils hacked Firefox 3.6 on Windows 7
64-bit In computer architecture, 64-bit integers, memory addresses, or other data units are those that are 64 bits wide. Also, 64-bit CPUs and ALUs are those that are based on processor registers, address buses, or data buses of that size. A compu ...
by using a memory corruption vulnerability and bypass ASLR and DEP, after which
Mozilla Mozilla (stylized as moz://a) is a free software community founded in 1998 by members of Netscape. The Mozilla community uses, develops, spreads and supports Mozilla products, thereby promoting exclusively free software and open standards, w ...
patched the security flaw in Firefox 3.6.3. Ralf-Philipp Weinmann and Vincenzo Iozzo hacked the iPhone 3GS by bypassing the digital code signatures used on the iPhone to verify that the code in memory is from Apple. Peter Vreugdenhil exploited Internet Explorer 8 on Windows 7 by using two vulnerabilities that involved bypassing
ASLR Address space layout randomization (ASLR) is a computer security technique involved in preventing Exploit (computer security), exploitation of memory corruption Vulnerability (computing), vulnerabilities. In order to prevent an attacker from reli ...
and evading DEP.


2011

The 2011 contest took place between March 9 until 11th during the CanSecWest conference in Vancouver. The web browser targets for the 2011 contest included Microsoft Internet Explorer, Apple Safari, Mozilla Firefox, and Google Chrome. New to the Pwn2Own contest was the fact that a new attack surface was allowed for penetrating mobile phones, specifically over cellphone
baseband In telecommunications and signal processing, baseband is the range of frequencies occupied by a signal that has not been modulated to higher frequencies. Baseband signals typically originate from transducers, converting some other variable int ...
s. The
mobile phone A mobile phone, cellular phone, cell phone, cellphone, handphone, hand phone or pocket phone, sometimes shortened to simply mobile, cell, or just phone, is a portable telephone that can make and receive calls over a radio frequency link whi ...
targets were
Dell Venue Pro The Dell Venue Pro, codenamed Lightning, was a smartphone running the Windows Phone operating system. The phone used the T-Mobile network, but was only available for purchase at Microsoft retail stores or directly from Dell. The launch of the ph ...
running
Windows Phone 7 Windows Phone 7 is the first release of the Windows Phone mobile client operating system, released worldwide on October 21, 2010, and in the United States on November 8, 2010. It runs on the Windows CE 6.0 kernel. It received multiple large upda ...
,
iPhone 4 The iPhone 4 is a smartphone that was designed and marketed by Apple Inc. It is the fourth generation of the iPhone lineup, succeeding the iPhone 3GS and preceding the 4S. Following a number of notable leaks, the iPhone 4 was first unvei ...
running
iOS iOS (formerly iPhone OS) is a mobile operating system created and developed by Apple Inc. exclusively for its hardware. It is the operating system that powers many of the company's mobile devices, including the iPhone; the term also include ...
, BlackBerry Torch 9800 running
BlackBerry OS BlackBerry OS is a discontinued proprietary mobile operating system developed by Canadian company BlackBerry Limited for its BlackBerry line of smartphone handheld devices. The operating system provides multitasking and supports specialized i ...
6.0, and
Nexus S The Nexus S 4G is a smartphone co-developed by Google and Samsung and manufactured by Samsung Electronics for release in 2010. It was the first smartphone to use the Android 2.3 "Gingerbread" operating system, and the first Android device to su ...
running Android 2.3. Several teams registered for the desktop browser contest. For Apple Safari, registered competitors included VUPEN, Anon_07, Team Anon, Charlie Miller. Mozilla Firefox included Sam Thomas and Anonymous_1. Microsoft Internet Explorer teams included Stephen Fewer, VUPEN, Sam Thomas, and Ahmed M Sleet. Google Chrome teams included Moatz Khader, Team Anon, and Ahmed M Sleet. For the mobile browser category, the following teams registered. For the Apple iPhone hack attempt, teams included Anon_07, Dion Blazakis and Charlie Miller, Team Anon, Anonymous_1, and Ahmed M Sleet. To hack the RIM Blackberry the teams wereAnonymous_1, Team Anon, and Ahmed M Sleet. To hack the Samsung Nexus S, teams included Jon Oberheide, Anonymous_1, Anon_07, and Team Anonymous. To hack the
Dell Venue Pro The Dell Venue Pro, codenamed Lightning, was a smartphone running the Windows Phone operating system. The phone used the T-Mobile network, but was only available for purchase at Microsoft retail stores or directly from Dell. The launch of the ph ...
, teams included
George Hotz George Francis Hotz (born October 2, 1989), alias geohot, is an American security hacker, entrepreneur, and software engineer. He is known for developing iOS jailbreaks, reverse engineering the PlayStation 3, and for the subsequent lawsuit bro ...
, Team Anonymous, Anonymous_1, and Ahmed M Sleet. During the first day of the competition, Safari and Internet Explorer were defeated by researchers. Safari was version 5.0.3 installed on a fully patched Mac OS X 10.6.6. French security firm VUPEN was the first to attack the browser. Internet Explorer was a 32-bit version 8 installed on 64-bit Windows 7 Service Pack 1. Security researcher Stephen Fewer of Harmony Security was successful in exploiting IE. This was demonstrated Just as with Safari. In day 2 the
iPhone 4 The iPhone 4 is a smartphone that was designed and marketed by Apple Inc. It is the fourth generation of the iPhone lineup, succeeding the iPhone 3GS and preceding the 4S. Following a number of notable leaks, the iPhone 4 was first unvei ...
and Blackberry Torch 9800 were both exploited. The iPhone was running iOS 4.2.1, however the flaw exists in version 4.3 of the iOS. Security researchers
Charlie Miller Charles Miller (born 18 March 1976) is a Scottish retired footballer. He started his career at Rangers, and was voted the SPFA Young Player of the Year in 1995 during his time with the club. After spells with English Premier League clubs Lei ...
and Dion Blazakis were able to gain access to the iPhone's address book through a vulnerability in Mobile Safari by visiting their exploit ridden webpage. The Blackberry Torch 9800 phone was running BlackBerry OS 6.0.0.246. The team of Vincenzo Iozzo, Willem Pinckaers, and Ralf Philipp Weinmann took advantage of a vulnerability in the Blackberry's WebKit based web browser by visiting their previously prepared webpage. Firefox, Android, and Windows Phone 7 were scheduled to be tested during day 2, but the security researchers that had been chosen for these platforms did not attempt any exploits. Sam Thomas had been selected to test Firefox, but he withdrew stating that his exploit was not stable. The researchers that had been chosen to test Android and Windows Phone 7 did not show up. No teams showed up for day three. Chrome and Firefox were not hacked.


2012

For 2012 the rules were changed to a capture-the-flag style competition with a point system. The new format caused
Charlie Miller Charles Miller (born 18 March 1976) is a Scottish retired footballer. He started his career at Rangers, and was voted the SPFA Young Player of the Year in 1995 during his time with the club. After spells with English Premier League clubs Lei ...
, successful at the event in past years, to decide not to attend, as it required "on-the-spot" writing of exploits that Miller argued favored larger teams. Hackers went against the four major browsers. At Pwn2Own 2012, Chrome was successfully exploited for the first time. VUPEN declined to reveal how they escaped the sandbox, saying they would sell the information. Internet Explorer 9 on Windows 7 was successfully exploited next. Firefox was the third browser to be hacked using a
zero day exploit A zero-day (also known as a 0-day) is a computer-software Vulnerability (computing), vulnerability previously unknown to those who should be interested in its mitigation, like the vendor of the target software. Until the vulnerability is mitigate ...
.Researchers hack into newest Firefox with zero-day flaw
ZDnet ZDNET is a business technology news website owned and operated by Red Ventures. The brand was founded on April 1, 1991, as a general interest technology portal from Ziff Davis and evolved into an enterprise IT-focused online publication. His ...
, March 9, 2012
Safari on Mac OS X Lion was the only browser left standing at the conclusion of the zero day portion of pwn2own. Versions of Safari that were not fully patched and running on Mac OS X Snow Leopard were compromised during the CVE portion of pwn2own. Significant improvements in the security mitigations within Mac OS X were introduced in Lion.PWN2OWN 2012 rules


Controversy with Google

Google withdrew from sponsorship of the event because the 2012 rules did not require full disclosure of exploits from winners, specifically exploits to break out of a sandboxed environment and demonstrated exploits that did not "win". Pwn2Own defended the decision, saying that it believed that no hackers would attempt to exploit Chrome if their methods had to be disclosed. Google offered a separate "Pwnium" contest that offered up to $60,000 for Chrome-specific exploits. Non-Chrome vulnerabilities used were guaranteed to be immediately reported to the appropriate vendor. Sergey Glazunov and a teenager identified as "PinkiePie" each earned $60,000 for exploits that bypassed the security sandbox. Google issued a fix to Chrome users in less than 24 hours after the Pwnium exploits were demonstrated.


2013

In 2013, Google returned as a sponsor and the rules were changed to require full disclosure of exploits and techniques used.Show off Your Security Skills: Pwn2Own and Pwnium 3
The Chromium Blog, January 28, 2013
The Mobile Pwn2Own 2013 contest was held November 13–14, 2013, during the PacSec 2013 Conference in Tokyo. Web browsers Google Chrome, Internet Explorer and Firefox, along with Windows 8 and Java, were exploited. Adobe also joined the contest, adding Reader and Flash. Apple Safari on Mountain Lion was not targeted as no teams showed up. French security firm VUPEN has successfully exploited a fully updated Internet Explorer 10 on Microsoft Surface Pro running a 64-bit version of Windows 8 and fully bypassed Protected Mode sandbox without crashing or freezing the browser. The VUPEN team then exploited Mozilla Firefox, Adobe Flash, and Oracle Java . Pinkie Pie won $50,000, and Google released Chrome updates on November 14 to address the vulnerabilities exploited. Nils and Jon from MWRLabs were successful at exploiting Google Chrome using WebKit and Windows kernel flaws to bypass Chrome sandbox and won $100,000.
George Hotz George Francis Hotz (born October 2, 1989), alias geohot, is an American security hacker, entrepreneur, and software engineer. He is known for developing iOS jailbreaks, reverse engineering the PlayStation 3, and for the subsequent lawsuit bro ...
exploited Adobe Acrobat Reader and escaped the sandbox to win $70,000. James Forshaw, Joshua Drake, and Ben Murphy independently exploited Oracle Java to win $20,000 each. The mobile contest saw contestants winning $117,500 out of a prize pool of $300,000.


2014

At Pwn2Own 2014 in March was held in Vancouver at the CanSecWest Conference and sponsored by Hewlett-Packard. All four targeted browsers fell to researchers, and contestants overall won $850,000 of an available pool of $1,085,000. VUPEN successfully exploited fully updated
Internet Explorer 11 Internet Explorer 11 (IE11) is the eleventh, final, and now deprecated version of the Internet Explorer web browser. It was initially included in the release of Windows 8.1, Windows RT 8.1 and Windows Server 2012 R2 on October 17, 2013, and was ...
, Adobe Reader XI, Google Chrome, Adobe Flash, and Mozilla Firefox on a 64-bit version of Windows 8.1, to win a total of $400,000—the highest payout to a single competitor to date. The company used a total of 11 distinct zero-day vulnerabilities. Among other successful exploits in 2014,
Internet Explorer 11 Internet Explorer 11 (IE11) is the eleventh, final, and now deprecated version of the Internet Explorer web browser. It was initially included in the release of Windows 8.1, Windows RT 8.1 and Windows Server 2012 R2 on October 17, 2013, and was ...
was exploited by Sebastian Apelt and Andreas Schmidt for a prize of $100,000. Apple Safari on Mac OS X Mavericks and Adobe Flash on Windows 8.1 were successfully exploited by Liang Chen of Keen Team and Zeguang Zhao of team509. Mozilla Firefox was exploited three times on the first day, and once more on the second day, with HP awarding researchers $50,000 for each disclosed Firefox flaw that year. Both Vupen and an anonymous participant exploited Google Chrome. Vupen earned $100,000 for the crack, while he anonymous entrant had their prize of $60,000 reduced, as their attack relied on a vulnerability revealed the day before at Google's Pwnium contest. Also, Nico Joly of the VUPEN team took on the Windows Phone (the
Lumia 1520 The Nokia Lumia 1520 was a flagship Windows Phone phablet smartphone designed and produced by Finnish telecommunications manufacturer Nokia in partnership with American software manufacturer Microsoft. The device was first announced at the Nokia ...
), but was unable to gain full control of the system. In 2014, Keen Lab hacked Windows 8.1 Adobe Flash in 16 seconds, as well as the OSX Mavericks Safari system in 20 seconds.


2015–2017

Every single prize available was claimed in 2015 in March in Vancouver, and all browsers were hacked for a total in $557,500 and other prizes. The top hacker proved to be Jung Hoon Lee, who took out "IE 11, both the stable and beta versions of Google Chrome, and Apple Safari" and earned $225,000 in prize money. Other hacks included Team509 and KeenTeem breaking into Adobe Flash, and other breaks in Adobe Reader. Overall, there were 5 bugs in the Windows operating system, 4 in Internet Explorer 11, 3 in Firefox, Adobe Reader, and Adobe Flash, 2 in Safari, and 1 in Chrome. Google ceased to be a sponsor of Pwn2Own in 2015. At the contest in March 2016, "each of the winning entries was able to avoid the sandboxing mitigations by leveraging vulnerabilities in the underlying OSs." In 2016, Chrome,
Microsoft Edge Microsoft Edge is a proprietary, cross-platform web browser created by Microsoft. It was first released in 2015 as part of Windows 10 and Xbox One and later ported to other platforms as a fork of Google's Chromium open-source project: Android ...
and Safari were all hacked. According to Brian Gorenc, manager of Vulnerability Research at HPE, they had chosen not to include Firefox that year as they had "wanted to focus on the browsers that admade serious security improvements in the last year". In 2016, Qihoo360 successfully hacked into a Pixel in under 60 seconds. In March 2017 in Vancouver, for the first time hackers broke into VMWare's virtual machine sandbox. In 2017, Chrome did not have any successful hacks (although only one team attempted to target Chrome), the subsequent browsers that best fared were, in order, Firefox, Safari and Edge. Mobile Pwn2Own was held on November 1 and 2 in 2017. Representatives from Apple, Google and Huawei were at the contest. Various smartphones, including ones using Apple's iOS 11.1 software, were also successfully hacked. The "11 successful attacks" were against the iPhone 7, the Huawei Mate 9 Pro and the
Samsung Galaxy S8 The Samsung Galaxy S8 and Samsung Galaxy S8+ are Android smartphones produced by Samsung Electronics as the eighth generation of the Samsung Galaxy S series. The S8 and S8+ were unveiled on 29 March 2017 and directly succeeded the Samsung Gal ...
.
Google Pixel Google Pixel is a brand of consumer electronic devices developed by Google that run either ChromeOS or the Android operating system. The Pixel brand was introduced in February 2013 with the first-generation Chromebook Pixel. The Pixel line inc ...
was not hacked. Overall, ZDI that year awarded $833,000 to uncover 51 zero-day bugs. The team Qihoo 360 won the top prize in 2017.


2018

In 2018, the conference was much smaller and sponsored primarily by Microsoft. China had banned its security researchers from participating in the contest, despite Chinese nationals winning in the past, and banned divulging security vulnerabilities to foreigners. In particular,
Tencent Tencent Holdings Ltd. () is a Chinese multinational technology and entertainment conglomerate and holding company headquartered in Shenzhen. It is one of the highest grossing multimedia companies in the world based on revenue. It is also the wo ...
's Keen Labs and Qihoo 360's 360Vulcan teem did not enter, nor any other Chinese nationals. A
Tianfu Cup Tianfu mainly refers to the Municipality of Chengdu or the Province of Sichuan. Tianfu may refer to: Locations in China *Sichuan Basin, a lowland region in southwestern China *Tianfu New Area, an in-city development area established in 2011 in ...
was subsequently designed to be a "Chinese version of Pwn2Own", also taking place twice a year. Also, shortly before the 2018 conference, Microsoft had patched several vulnerabilities in Edge, causing many teams to withdraw. Nevertheless, certain openings were found in Edge, Safari, Firefox and more. No hack attempts were made against Chrome, although the reward offered was the same as for Edge. Hackers were ultimately awarded $267,000. While many Microsoft products had large rewards available to anyone who was able to gain access through them, only Edge was successfully exploited, and also Safari and Firefox.


2019

A March 2019 contest took place in Vancouver at the CanSecWest conference, with categories including
VMware ESXi VMware ESXi (formerly ESX) is an enterprise-class, type-1 hypervisor developed by VMware for deploying and serving virtual computers. As a type-1 hypervisor, ESXi is not a software application that is installed on an operating system (OS); ...
,
VMware Workstation VMware Workstation Pro (known as VMware Workstation until release of VMware Workstation 12 in 2015) is a hosted (Type 2) hypervisor that runs on x64 versions of Windows and Linux operating systemshttps://kb.vmware.com/selfservice/microsites/sear ...
,
Oracle VirtualBox Oracle VM VirtualBox (formerly Sun VirtualBox, Sun xVM VirtualBox and Innotek VirtualBox) is a type-2 hypervisor for x86 virtualization developed by Oracle Corporation. VirtualBox was originally created by Innotek GmbH, which was acquired by ...
, Chrome, Microsoft Edge, and Firefox, as well as Tesla. Tesla entered its new
Model 3 The Tesla Model 3 is a compact executive sedan that is battery powered and produced by Tesla. Limited production of the Model 3 began in mid-2017, with the first production vehicle rolling off the assembly line on July 7, 2017. The offici ...
sedan, with a pair of researchers earning $375,000 and the car they hacked after finding a severe memory randomization bug in the car's infotainment system. It was also the first year that hacking of devices in the home automation category was allowed. In October 2019, ''
Politico ''Politico'' (stylized in all caps), known originally as ''The Politico'', is an American, German-owned political journalism newspaper company based in Arlington County, Virginia, that covers politics and policy in the United States and intern ...
'' reported that the next edition of Pwn2Own had added industrial control systems. Pwn2Own Tokyo was held November 6 to November 7, and was expected to hand out $750,000 in cash and prizes.
Facebook Portal Meta Portal (also known as Portal) is a brand of smart displays and videophones released in 2018 by Facebook Inc. (now named Meta Platforms). The product line consists of four models (Portal, Portal+, Portal TV, and Portal Go) that provide vide ...
was entered, as was the Amazon Echo Show 5, a
Google Nest Google Nest is a line of smart home products including smart speakers, smart displays, streaming devices, thermostats, smoke detectors, routers and security systems including smart doorbells, cameras and smart locks. The Nest brand name was ...
Hub Max, an Amazon Cloud Cam and a Nest Cam IQ Indoor. Also entered was the
Oculus Quest The Oculus Quest is a virtual reality (VR) headset developed by Oculus, a division of Meta, Inc., released on May 21, 2019. Similar to its predecessor, Oculus Go, it is a standalone device that can run games and software wirelessly under an ...
virtual reality kit. In 2019, a team won $60,000 hacking into an Amazon Echo Show 5. They did so by hacking into the "patch gap" that meshed older software patched onto other platforms, as the smart screen used an old version of Chromium. The team shared the findings with Amazon, which said it was investigating the hack and would take "appropriate steps."


2020

A new edition of the Pwn2Own contest took place on January 21–23, 2020, in Miami at the S4 conference, with
industrial control system An industrial control system (ICS) is an electronic control system and associated instrumentation used for industrial process control. Control systems can range in size from a few modular panel-mounted controllers to large interconnected and in ...
and SCADA targets only. Contestants were awarded more than $250,000 over the three day event as hackers demonstrated a multiple exploits in many leading ICS platforms. Steven Seeley and Chris Anastasio, a hacker duo calling themselves Team Incite, were awarded the title of Master of Pwn with winnings of $80,000 and 92.5 Master of Pwn points. Overall, the contest had 14 winning demonstrations, nine partial wins due to bug collisions, and two failed entries. The spring edition of Pwn2Own 2020 occurred on March 18–19, 2020. Tesla again returned as a sponsor and had a Model 3 as an available target. Due to COVID-19, the conference moved to a virtual event. The Zero Day Initiative decided to allow remote participation. This allowed researchers to send their exploits to the program prior to the event. ZDI researchers then ran the exploits from their homes and recorded the screen as well as the Zoom call with the contestant. The contest saw six successful demonstrations and awarded $270,000 over the two-day event while purchasing 13 unique bugs in Adobe Reader, Apple Safari and macOS, Microsoft Windows, and Oracle VirtualBox. The duo of Amat Cama and Richard Zhu (Team Fluoroacetate) was crowned Master of Pwn with earnings of $90,000. The fall edition on Pwn2Own, normally referred to as Pwn2Own Tokyo, was held on November 5–7, 2020. With the lockdown from COVID-19 continuing, the contest was again held virtually and titled Pwn2Own Tokyo (Live From Toronto). ZDI researchers in Toronto ran the event, with others connecting from home. This contest also saw the inclusion of storage area network (SAN) servers as a target. The event had eight winning entries, nine partial wins due to bug collisions, and two failed attempts. Overall, the contest awarded $136,500 for 23 unique bugs. The Flashback Team (Pedro Ribeiro and Radek Domanski) earned the Master of Pwn title with two successful Wide Area Network (WAN) router exploits.


2021

On April 6–8, 2021, the Pwn2Own contest took place in Austin and virtually. This year's event expanded by adding the Enterprise Communications category, which includes Microsoft Teams and Zoom Messenger. The first day of the contest saw Apple Safari, Microsoft Exchange, Microsoft Teams, Windows 10, and Ubuntu all compromised. Zoom Messenger was compromised on the second day of the contest with a zero-click exploit. Parallels Desktop, Google Chrome, and Microsoft Edge were also successfully exploited during the contest. Over US$1,200,000 was awarded for 23 unique 0-days. Master of Pwn was a three-way tie between Team DEVCORE, OV, and the team of Daan Keuper & Thijs Alkemade. This year's contest also saw the first ever female participant, Alisa Esage.


2022

The second edition of Pwn2Own Miami occurred between April 19–21, 2022, at the Filmore in South Beach Miami. Over the three-day contest, $400,000 was awarded for 26 unique 0-days. The team of Daan Keuper and Thijs Alkemade from Computest Sector 7 were awarded Master of Pwn with earnings of $90,000. A highlight of the contest was a demonstration from Daan and Thijs bypassing the trusted application check on the OPC Foundation OPC UA .NET Standard. Pwn2Own returned to Vancouver on May 18–20, 2022, to celebrate the 15th anniversary of the contest. Over the three-day event, the ZDI awarded US$1,155,000 for 25 unique 0-day vulnerabilities. Day One of the contest set a single-day contest record of US$800,000 awarded for various exploits, including three separate Microsoft Teams demonstrations. One of these exploits required no user interaction and could be used to compromise an entire organization. Also demonstrated were successful demonstrations against the Mozilla Firefox and Apple Safari web browsers. Day Two of the contest was highlighted by a remote exploit of the Tesla Infotainment system. Researchers from the Synacktiv Team were able to remotely start the windshield wipers, open the trunk, and flash the headlights of the vehicle. The event's final day saw three of the six Windows 11 privilege escalations successfully demonstrated. All six of these exploits used unique bugs. Samsung's flagship phone, the Galaxy S22, running the latest Android 13, was hacked in less than a minute. Once all the points were totaled, the STAR Labs team was awarded the title of Master of Pwn with $270,000 and 27 points.


See also

*
Competitive programming Competitive programming is a mind sport usually held over the Internet or a local network, involving participants trying to program according to provided specifications. Contestants are referred to as ''sport programmers''. Competitive progra ...
*
White hat (computer security) A white hat (or a white-hat hacker, a whitehat) is an ethical security hacker. Ethical hacking is a term meant to imply a broader category than just penetration testing. Under the owner's consent, white-hat hackers aim to identify any vulnerabili ...
* Zero Day Initiative * DEF CON


References


External links


CanSecWest Applied Security Conference
{{web browsers Web browsers Annual events in Canada Computer security conferences Programming contests