Episode

82: Master of Pwn
listen on Spotify
1:07:24
Published: Tue Jan 05 2021
Description

The Zero Day Initiative runs a hacker contest called Pwn2Own. The contest calls the best hackers in the world to demonstrate they can hack into software that should be secure. Like browsers, phones, and even cars. A lot of vulnerabilities are discovered from this event which means vendors must fix them. Whoever can demonstrate the most vulnerabilities will be crowned the “Master of Pwn”. Thanks to Dustin Childs and Brian Gorenc from ZDI to hear all about Pwn2Own. Thanks to Radek and Pedro for sharing their experiences of becoming the Masters of Pwn. Sponsors Support for this show comes from Blinkist. They offer thousands of condensed non-fiction books, so you can get through books in about 15 minutes. Check out Blinkist.com/DARKNET to start your 7 day free trial and get 25% off when you sign up. Support for this show comes from Kars 4 Kids. Donate your car today, this organization will sell to use for their charity. View all active sponsors. Sources https://www.forbes.com/profile/lee-junghoon/?sh=49ee055fc9c7 https://www.cyberscoop.com/pwn2own-chinese-researchers-360-technologies-trend-micro/ https://twitter.com/BrendanEich/status/697889208380293120 https://www.techtimes.com/articles/247111/20200130/google-bug-bounty-2019-became-the-highest-paid-google-hackers-reaching-6-5-million.htm Learn more about your ad choices. Visit podcastchoices.com/adchoices

Chapters
This podcast discusses the world's highest paying hacker contest which is fair, transparent and open to everyone around the globe, however many good hackers still prefer to stay in the shadows.
00:00 - 01:44 (01:44)
listen on Spotify
Hacker Contest
Summary

This podcast discusses the world's highest paying hacker contest which is fair, transparent and open to everyone around the globe, however many good hackers still prefer to stay in the shadows.

Episode
82: Master of Pwn
Podcast
Darknet Diaries
ZDI helps security researchers by putting pressure on tech companies to quickly address reported bugs.
01:44 - 10:27 (08:43)
listen on Spotify
Cybersecurity
Summary

ZDI helps security researchers by putting pressure on tech companies to quickly address reported bugs. While several software vendors have bug bounty programs to encourage bug reporting, ZDI does not receive payment for the reported bugs.

Episode
82: Master of Pwn
Podcast
Darknet Diaries
The Pwn2Own contest allows security researchers to showcase their ability to exploit popular software applications, and successful exploits can provide insights that help to improve cyber defenses.
10:27 - 18:12 (07:44)
listen on Spotify
cybersecurity
Summary

The Pwn2Own contest allows security researchers to showcase their ability to exploit popular software applications, and successful exploits can provide insights that help to improve cyber defenses. In this text, a participant recalls analyzing a particularly efficient exploit and outlines the effort and skill that goes into developing them.

Episode
82: Master of Pwn
Podcast
Darknet Diaries
The evolution of a cyber arms race has led to the emergence of a market for zero-day exploits, where individuals and organizations can buy and sell vulnerabilities for enormous sums of money, a practice common among nations, mercenaries, and even on the dark web.
18:12 - 22:54 (04:41)
listen on Spotify
Cybersecurity
Summary

The evolution of a cyber arms race has led to the emergence of a market for zero-day exploits, where individuals and organizations can buy and sell vulnerabilities for enormous sums of money, a practice common among nations, mercenaries, and even on the dark web.

Episode
82: Master of Pwn
Podcast
Darknet Diaries
The Pwn2Own contest has seen better vendor participation over the years, leading to improvements in security measures like sandbox and rendering engines in browsers.
22:54 - 29:05 (06:11)
listen on Spotify
Pwn2Own
Summary

The Pwn2Own contest has seen better vendor participation over the years, leading to improvements in security measures like sandbox and rendering engines in browsers. An example of an interesting Pwn2Own exploit is the IE exploit that forced the browser to open the on-screen keyboard and execute commands on the operating system.

Episode
82: Master of Pwn
Podcast
Darknet Diaries
Pwn2Own hacking contest has evolved as companies now research other research teams' techniques to find bugs that can then be submitted to the vendor prior to the contest, leading to the introduction of crowning an overall winner, Master of Pwn.
29:05 - 35:39 (06:33)
listen on Spotify
Hacking
Summary

Pwn2Own hacking contest has evolved as companies now research other research teams' techniques to find bugs that can then be submitted to the vendor prior to the contest, leading to the introduction of crowning an overall winner, Master of Pwn.

Episode
82: Master of Pwn
Podcast
Darknet Diaries
Researchers demonstrated a technique of escaping VMware Workstation hypervisor and compromising the host operating system by exploiting a vulnerability in the VGA driver.
35:41 - 42:06 (06:25)
listen on Spotify
cybersecurity
Summary

Researchers demonstrated a technique of escaping VMware Workstation hypervisor and compromising the host operating system by exploiting a vulnerability in the VGA driver.

Episode
82: Master of Pwn
Podcast
Darknet Diaries
A team involved in a smartphone hacking contest reveals how they exploit vulnerabilities in the baseband processor to gain code execution and retrieve deleted content from the phone.
42:06 - 50:07 (08:00)
listen on Spotify
Smartphone Hacking
Summary

A team involved in a smartphone hacking contest reveals how they exploit vulnerabilities in the baseband processor to gain code execution and retrieve deleted content from the phone.

Episode
82: Master of Pwn
Podcast
Darknet Diaries
Pedro and Petra team up to efficiently find zero-day vulnerabilities and have a track record of success, with over 100 RCs under Pedro's name and a passion for fresh experiences with every new exploit they discover.
50:07 - 57:30 (07:23)
listen on Spotify
cybersecurity
Summary

Pedro and Petra team up to efficiently find zero-day vulnerabilities and have a track record of success, with over 100 RCs under Pedro's name and a passion for fresh experiences with every new exploit they discover.

Episode
82: Master of Pwn
Podcast
Darknet Diaries
The hacking group called Team Flashback has brought 11 working zero-day exploits to three different Pwn2Own events and has taken money home from each event.
57:30 - 1:01:35 (04:05)
listen on Spotify
Hacking
Summary

The hacking group called Team Flashback has brought 11 working zero-day exploits to three different Pwn2Own events and has taken money home from each event. The group has managed to exploit devices without the user being aware of the backdoor being planted, which actually survives factory reset.

Episode
82: Master of Pwn
Podcast
Darknet Diaries
Radek and Pedro have discovered more than 200 zero-day exploits, while many governments and hackers are buying and keeping them as top-secret tools.
1:01:35 - 1:07:09 (05:33)
listen on Spotify
Cybersecurity
Summary

Radek and Pedro have discovered more than 200 zero-day exploits, while many governments and hackers are buying and keeping them as top-secret tools. Recent policies in China discourage researchers from sharing exploits at foreign hacking competitions.

Episode
82: Master of Pwn
Podcast
Darknet Diaries