Hack Chrome, Win $20,000 79
CWmike writes "Google will pay $20,000 to the first to exploit its Chrome browser at this year's Pwn2Own hacking contest at CanSecWest in Vancouver, BC, on March 9. At this year's Pwn2Own, researchers will pit exploits against machines running Windows 7 or Mac OS X as they try to bring down Microsoft's IE, Mozilla's Firefox, Apple's Safari and Chrome. The first researchers to hack IE, Firefox and Safari will receive $15,000 and the machine running the browser. The prizes are $5,000 more than those given for exploiting browsers at the last Pwn2Own contest, and three times more than the 2009 awards. 'We've upped the ante this time around and the total cash pool allotted for prizes has risen to a whopping $125,000,' said Aaron Portnoy, the manager of the sponsor, HP TippingPoint's security research team, which set the contest's rules Wednesday in a blog post written by Portnoy."
Re: (Score:1)
Slashdot wins (Score:2)
I presume it would be easier on Windows anyway so who cares?
My Chrome on Win7 looks all funny in the new Slashdot.
Re: (Score:2, Insightful)
Re: (Score:2)
Immanentizing the eschaton?
Re: (Score:2)
Re: (Score:2)
Pwn2Own has been going on for years. Just Google the competition and the goal required to win a prize is very clearly explained.
Re: (Score:2)
I'm a bit confused by the article. They use so many buzzwords I'm not sure what they're looking for when they say "hack".
1 vulnerability to escape a sandbox, 1 vulnerability to exploit a bug in chrome, but to what end? Hijacking someone's session data?
Golf may be involved. Perhaps a taxi driver golfing, with a driver.
Re: (Score:2)
The machine is a prize? (Score:4, Funny)
The list of prizes includes "... the machine running the browser."
Who would be dumb enough to use a computer they won from a hacking contest?
Re: (Score:3)
Re: (Score:3)
Not if the hardware was compromised.
Re: (Score:2, Insightful)
*facepalm*
Re: (Score:2)
Re: (Score:1)
I know browser hackers are not necessarily quite as skilled as (open)bsd hackers (but have success much more often) but i would think that the effort to make a hardware exploit that is undetectable to a winner would be more effort than its worth (it would have to survive a motherboard inspection and behave like the regular component almost all of the time) when it is likely that most hacking would be done from a desktop.
Or if you think hacking the browser did the damage i think they win when they can execut
Re: (Score:2)
Re: (Score:2)
who says you have to connect it to the internet?
Re: (Score:1)
I'd take it. I don't mind non-virgin machines.
random question:
- I'm running the non-google Chromium right now. Any reason to upgrade to Chrome?
Re: (Score:2)
Why would you need to change the mac address?
Its like people think that someone else knowing your NIC's MAC is a security issue; you cant even discover a MAC address once you go through a router.
Re: (Score:2)
That's a kind of silly question. It's not like a door that has been broken open and won't close. They'll probably take it home, install Linux on it, maybe change the MAC address on the NIC, and it's basically a new machine.
They'll install Linux in a door?!
Now I'm confused too.
Re:The machine is a prize? (Score:5, Funny)
"I'll take Things to do with faulty Sandy Bridge machines for 200 Alex".
Re: (Score:1)
Why?? You would have a rather good understanding of what you just did to the computer so you can fix it.
Or if you are worried about being traced as a hacker the hard drive would immediately be formatted and os reinstalled and if you are especially paranoid or do illegal hacking change the MAC address.
Re: (Score:1)
note the if conditional statement >> if(paranoid || illegal hacker)
if he was he might see the need to do this
google mac address changer for me. I don’t know the specifics but its not on the motherboard its on network hardware so proof of concept would be to swap out the hardware.
Re: (Score:2)
you can spoof a mac address in software anyway; the ifconfig ether command for instance.
Re: (Score:2)
From what I understand, the people receiving the machine would be the ones hacking it in the first place. I don't think there would be a problem.
Re: (Score:2)
Windows Update can't solder a keylogger into my USB subsystem, so even if I used Windows, I wouldn't be too worried about that.
Re: (Score:1)
Let's start with the fact that as the WINNER of the contest, they were the ones who hacked it before we get into the other absurdities of that statement.
Oh, and remember that this is only a contest, so they're just trying to get through the security, not actually do anything damaging once they're in.
Re: (Score:1)
Cat and Mouse (Score:1)
Re: (Score:1)
Hack Chrome, Win $20,000 (Score:3)
Shouldn't the prize be a free copy of Chrome?
Oh. Wait...
Re: (Score:1)
Chrome stands tall (Score:4, Insightful)
Re: (Score:1)
>>>Chrome has never been hacked
Impressive. Are there any other browsers that can claim that distinction? SeaMonkey? Opera? Amiga Origyn? Mozilla TimberWolf?
Re: (Score:2)
Not Opera, apparently: https://www.alternativ-testing.fr/blog/index.php?post%2F2011%2F%5BCVE-XXXX-XXXX%5D-Opera-11-Integer-Truncation-Vulnerability [alternativ-testing.fr]
But in general, plenty, but none with that user base.
Re: (Score:2)
And you're an idiot because it was Randyll who said Chrome had never been hacked [slashdot.org], not me.
Re: (Score:2, Informative)
Yeah, people sometimes forget about this when talking about sandboxes. The sandbox might prevent malware from escaping to the OS or to another tab process, but it WON'T prevent it from masquerading as the tab session, and snooping on whatever you're doing in that tab. Even if things like form input/submission were moved to the broker, the malware could just rewrite the DOM, since parsing is typically done with least permissions. It's just a short-lived malware infection, existing only in memory.
Re: (Score:1)
Chrome has never been hacked
Except for the one time when Bobby Quine and Automatic Jack picked up that Russian icebreaker from the Finn, but the whole Sprawl thinks that's just a legend now.
Unhackable eh? (Score:1)
Re: (Score:2)
Whenever I see "un" attached to an adjective, I'm inclined to believe it to be false.
Even unstable [wikipedia.org]?
(Affected players did have a workaround, but it wasn't on the official support pages.)
Good to hear (Score:2, Interesting)
It's good to hear that we finally can link the pwnage and the ownage together. It's only fair, after all (ref. owning the machine you just pwned)
Microsoft Copied... HA! (Score:3)
Re: (Score:2)
for me, risk-reward logic gets skewed if i have to do something that i consider wrong( whatever that means). even if presented with great rewards and low risk i might choose not to do something if i find it immoral.
i expect the majority of people to think likewise.
So how does this all work? (Score:1)
I'm curious, how does this contest work? You sign up for a 30 minute spot. Do they allow the security researcher to sit at the system to compromise and operate it or does the security researcher direct a user to visit some url with a potential exploit? Part of the contest is to exploit the browser so I am guessing that the browser needs someone operating it and fetching well crafted html etc. from some where.
The phone stuff looks interesting as they are looking for drive by exploits as well as browser ex
Re: (Score:2)
There's pretty much no challenge attacking a system you have physical access to.
sure win? (Score:2)
Re: (Score:1)
Don't trust Chrome with more than $20k (Score:3)
What I get from this is that Google is so certain of Chrome's security, they're willing to trust $20k on that security. The lesson you can take from this is not to do anything with the Chrome browser that would put you at risk of losing more than $20k. After all, the authors won't risk more than that. Of course, other authors are even less certain of their browser's security...
but no Linux? (Score:1)
Waste of time and money (Score:2)
This is pure marketing. If they want to prove to me it's secure, ask for a public code review and reward those who find clear problems, and compile from that reworked code.
A "pass" from a hacking contest only shows that at a specific point in time, a specific set of people with specific skills were either unable to break a specific version of the software or unwilling to tell the organisers what they found so they could exploit that later for much more profit.
Any occurrence of the word "specific" indicates
Re: (Score:2)
This is pure marketing. If they want to prove to me it's secure, ask for a public code review and reward those who find clear problems, and compile from that reworked code.
The codebase (minus PDF, Flash, and branding) is open source. Google pays out anywhere from $500 to $3113.70 to anyone who reports Chrome/Chromium security vulnerabilities to them. And if you look at the release notes on Chrome and Safari it's obvious that Google has a full-time team searching for and fixing security issues in both Chrome and WebKit. I'm not sure what else you want them to do, because they're already going well beyond anything you suggested.
Re: (Score:2)
Maybe stop marketing gimmicks? There are two direct problems with what they do here:
1 - it gives others the impression that hack contests are the way to assure security. This is the same as corporate execs relying on audit to assure the security of an IT platform instead of making sure they have solid fundamentals in place so that no retro-fitting is required.
2 - it takes away the focus from the fact that they do indeed do the preparing work as well. They could make more work of the whole process instead
Not enough cash (Score:2)