Close Menu
Innovation Village | Technology, Product Reviews, Business
    Facebook X (Twitter) Instagram
    Saturday, November 1
    • About us
      • Authors
    • Contact us
    • Privacy policy
    • Terms of use
    • Advertise
    • Newsletter
    • Post a Job
    • Partners
    Facebook X (Twitter) LinkedIn YouTube WhatsApp
    Innovation Village | Technology, Product Reviews, Business
    • Home
    • Innovation
      • Products
      • Technology
      • Internet of Things
    • Business
      • Agritech
      • Fintech
      • Healthtech
      • Investments
        • Cryptocurrency
      • People
      • Startups
      • Women In Tech
    • Media
      • Entertainment
      • Gaming
    • Reviews
      • Gadgets
      • Apps
      • How To
    • Giveaways
    • Jobs
    Innovation Village | Technology, Product Reviews, Business
    You are at:Home»News»Security Researchers Hack macOS With a Message on the TouchBar at Pwn2Own 2017
    Pwn2Own 2017

    Security Researchers Hack macOS With a Message on the TouchBar at Pwn2Own 2017

    0
    By Chidi on March 17, 2017 News

    I guess MacBook Pro’s Touch Bar isn’t as secure as we thought. Security researchers demonstrated multiple hacks of macOS on the first day of Pwn2Own 2017, including one that left a special message on the new MacBook’s TouchBar.

    Zero Day Initiative details the successful hacks of the day:

    Samuel Groß (@5aelo) and Niklas Baumstark (_niklasb) targeting Apple Safari with an escalation to root on macOS
    ● PARTIAL SUCCESS: In a partial win, Samuel Groß (@5aelo) and Niklas Baumstark (@_niklasb) earn some style points by leaving a special message on the touch bar of the Mac. They used a use-after-free (UAF) in Safari combined with three logic bugs and a null pointer dereference to exploit Safari and elevate to root in macOS. They still managed to earn $28,000 USD and 9 Master of Pwn points.

    Chaitin Security Research Lab (@ChaitinTech) targeting Apple Safari with an escalation to root on macOS
    ● SUCCESS: The Chaitin Security Research Lab (@ChaitinTech) successfuly exploited Apple Safari to gain root access on macOS by using a total of six bugs in their exploit chain including an info disclosure in Safari, four different type confusions bugs in the browser, and an a UAF in WindowServer. This earned the team $35,000 and 11 points towards Master of Pwn.


    ZDI is offering more than $1,000,000 across different categories to see the latest research and will again crown a Master of Pwn at the end of three days.

    This year’s event features 11 teams of contestants targeting products across four categories – 30 different attempts in total. Each contestant has three attempts within their allotted timeslot to demonstrate the exploit.

    Read More

    Related

    Share. Facebook Twitter Pinterest LinkedIn Email
    Chidi
    • Website
    • Facebook
    • X (Twitter)

    Tech & Gadget enthusiast | Apple fan | Sci-fi/Music lover | Software engineer

    Related Posts

    Bluesky reaches 40M users, prepares to launch dislike feature

    Pesapal launches “Drive” to revolutionize fleet fuel management across East Africa

    Hilda Baci Becomes Scanfrost Brand Ambassador, Showcasing Nigerian Home Innovation

    Leave A Reply Cancel Reply

    You must be logged in to post a comment.

    Copyright ©, 2013-2024 Innovation-Village.com. All Rights Reserved

    Type above and press Enter to search. Press Esc to cancel.

     

    Loading Comments...
     

    You must be logged in to post a comment.