Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Pwn2Own Hacking Contest Targets Microsoft EMET Protections

Hewlett-Packard’s Zero Day Initiative (ZDI) is putting up $645,000 in cash prizes for researchers involved in this year’s Pwn2Own contest, including $150,000 for anyone who can circumvent the protections of Microsoft’s Enhanced Mitigation Experience Toolkit (EMET).

Hewlett-Packard’s Zero Day Initiative (ZDI) is putting up $645,000 in cash prizes for researchers involved in this year’s Pwn2Own contest, including $150,000 for anyone who can circumvent the protections of Microsoft’s Enhanced Mitigation Experience Toolkit (EMET).

The annual contest, which will take place at the CanSecWest conference in Vancouver, awards white hat hackers who are able to takedown popular browsers and browser plugins. But this is the first time a specific prize has been offered for defeating EMET.

“The latest versions of Internet Explorer run in a special, isolated area of the computer’s memory,” explained Angela Gunn, senior security content developer at HP, in a blog post.  “Tech folk call that a “sandbox,” but you can think of it as a padded room where an application can spend time without hurting itself or others. The first step in the contest is to break out of IE’s padded room – using a fault in the construction of the padded room itself.”

“Once that’s done, the contestant must gain control over the rest of the computer,” she blogged. “The second challenge is for the contestant to locate and use more faults in the system to read its information, change its data, and eventually control its behavior as he pleases; the newest 64-bit computers make that tough, but a successful contestant will prevail.”

“But there’s one more hurdle,” she added. “Microsoft has software called the Enhanced Mitigation Experience Toolkit (EMET). It essentially builds more padded rooms inside Windows and protects against many kinds of attack techniques – including payloads installed by attackers seeking the Exploit Unicorn. The third and ultimate test for our contestants is to break through EMET protections and truly control the computer.”

The hack must be done on a machine running Windows 8.1 x64 and Internet Explorer 11. Just exploiting IE 11 on Windows 8.1 x64 without beating EMET will garner a $100,000 prize. Other targets in the contest include the Google Chrome browser, Apple Safari and Mozilla Firefox, as well as the Oracle Java and Adobe Flash Player and Adobe Reader plug-ins.

Vulnerabilities and exploit techniques revealed at the contest will be disclosed to the affected vendors, and the proof-of-concept will become the property of HP.

Advertisement. Scroll to continue reading.

The contest will run from March 12 to March 13. Interested researchers can register here at [email protected] 

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Vulnerabilities

The latest Chrome update brings patches for eight vulnerabilities, including seven reported by external researchers.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

Vulnerabilities

Apple has released updates for macOS, iOS and Safari and they all include a WebKit patch for a zero-day vulnerability tracked as CVE-2023-23529.

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

IoT Security

A vulnerability affecting Dahua cameras and video recorders can be exploited by threat actors to modify a device’s system time.