Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Pwn2Own Hacking Contest Targets Microsoft EMET Protections

Hewlett-Packard’s Zero Day Initiative (ZDI) is putting up $645,000 in cash prizes for researchers involved in this year’s Pwn2Own contest, including $150,000 for anyone who can circumvent the protections of Microsoft’s Enhanced Mitigation Experience Toolkit (EMET).

Hewlett-Packard’s Zero Day Initiative (ZDI) is putting up $645,000 in cash prizes for researchers involved in this year’s Pwn2Own contest, including $150,000 for anyone who can circumvent the protections of Microsoft’s Enhanced Mitigation Experience Toolkit (EMET).

The annual contest, which will take place at the CanSecWest conference in Vancouver, awards white hat hackers who are able to takedown popular browsers and browser plugins. But this is the first time a specific prize has been offered for defeating EMET.

“The latest versions of Internet Explorer run in a special, isolated area of the computer’s memory,” explained Angela Gunn, senior security content developer at HP, in a blog post.  “Tech folk call that a “sandbox,” but you can think of it as a padded room where an application can spend time without hurting itself or others. The first step in the contest is to break out of IE’s padded room – using a fault in the construction of the padded room itself.”

“Once that’s done, the contestant must gain control over the rest of the computer,” she blogged. “The second challenge is for the contestant to locate and use more faults in the system to read its information, change its data, and eventually control its behavior as he pleases; the newest 64-bit computers make that tough, but a successful contestant will prevail.”

“But there’s one more hurdle,” she added. “Microsoft has software called the Enhanced Mitigation Experience Toolkit (EMET). It essentially builds more padded rooms inside Windows and protects against many kinds of attack techniques – including payloads installed by attackers seeking the Exploit Unicorn. The third and ultimate test for our contestants is to break through EMET protections and truly control the computer.”

The hack must be done on a machine running Windows 8.1 x64 and Internet Explorer 11. Just exploiting IE 11 on Windows 8.1 x64 without beating EMET will garner a $100,000 prize. Other targets in the contest include the Google Chrome browser, Apple Safari and Mozilla Firefox, as well as the Oracle Java and Adobe Flash Player and Adobe Reader plug-ins.

Vulnerabilities and exploit techniques revealed at the contest will be disclosed to the affected vendors, and the proof-of-concept will become the property of HP.

The contest will run from March 12 to March 13. Interested researchers can register here at [email protected]

Advertisement. Scroll to continue reading.
Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

IoT Security

A vulnerability affecting Dahua cameras and video recorders can be exploited by threat actors to modify a device’s system time.