Close Menu
BlogSpotTipsBlogSpotTips
  • Home
  • Education
  • Finance
  • Latest Internet News
    • Social Media
    • Software
  • Game
  • Contact Us !
Facebook X (Twitter) Instagram
BlogSpotTipsBlogSpotTips
  • Home
  • Education
  • Finance
  • Latest Internet News
    • Social Media
    • Software
  • Game
  • Contact Us !
Facebook X (Twitter) Instagram
BlogSpotTipsBlogSpotTips
Home»Social Media»Pwn2Own contest puts $75,000 bounty on VMware Workstation bypass
Social Media

Pwn2Own contest puts $75,000 bounty on VMware Workstation bypass

DeepBy DeepFebruary 24, 2016No Comments2 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email

20151027 vmware sign

The Pwn2Own hacking contest will return in March, pitting researchers against the most popular browsers and operating systems. The novelty: Contestants can win a $75,00 prize for escaping a VMware virtual machine.

Contestants will be able to exploit Microsoft Edge or Google Chrome on fully patched versions of 64-bit Windows 10 and Apple Safari on OS X El Capitan. System or root-level privilege escalation pays extra, as does escaping from the virtual machine.

Every year, Pwn2Own, at the CanSecWest security conference, has slightly modified rules, and 2016 is no different. Adobe Reader, Mozilla Firefox and Internet Explorer are no longer on the contest’s target list. Adobe Flash remains, but only the version that comes bundled with Microsoft Edge.

Exploiting Google Chrome or Microsoft Edge will earn hackers $65,000, while exploitingApple Safari on Mac only $40,000. Achieving system-level access on Windows or root access on Mac OS X would add another $20,000 to the final payout.

The significant prize differences between Chrome, Edge and Safari exploits might stem  from protections on Windows offered by the Microsoft Enhanced Mitigation Experience Toolkit (EMET).

EMET is a tool, primarily aimed at businesses, that applies various exploit mitigation technologies to applications that otherwise lack them. This adds additional complexity and significant hurdles for exploit developers.

On top of that, the Windows environment will run as a guest OS in a virtual machine created with VMware Workstation. Breaking out of the virtual machine is not mandatory, but those who do so will earn an additional $75,000.

Potential vulnerabilities in Workstation would not be good news for VMware, which laid off most of its developers working on the product in January. The company said at the time that its computing virtualization products like Workstation and Fusion have reached maturity and will play a decreasing role in its business.

Pwn2Own has been historically organized by security appliance maker TippingPoint, a division of Hewlett Packard that also runs the Zero Day Initiative, a vulnerability acquisition program. However, because Trend Micro entered into an agreement to acquire TippingPoint in October, this year’s Pwn2Own will be sponsored by both Hewlett Packard Enterprise and Trend Micro.

[“source -cncb”]

$75 000 bounty bypass contest on puts Pwn2Own VMware Workstation
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Deep

Related Posts

Social Media and Relationships

May 27, 2025

Online Counselling for Individuals and Couples

May 27, 2025

The Best Time to Post on Threads in 2025 — Data from 700K+ Posts

May 20, 2025
Recent Post
  • Financial Audits and Payment Compliance: The Role of TPS
  • Social Media and Relationships
  • Online Counselling for Individuals and Couples
  • The Best Time to Post on Threads in 2025 — Data from 700K+ Posts
  • Using AI-powered Enterprise Interfaces to Optimize Operational Efficiency
  • How to Grow Your Brand with Micro Influencer Marketing
  • What Are the 8 Different Types of Video Game Articles?
  • Strategies for Greater Financial Flexibility: 5 Smart Ways to Repay Your Home Loan Faster
Search
  • Home
  • Privacy Policy
  • Contact Us !
© 2025 BlogSpotTips. Designed by BlogSpotTips.

Type above and press Enter to search. Press Esc to cancel.