Close Menu
Innovation Village | Technology, Product Reviews, Business
    Facebook X (Twitter) Instagram
    Monday, July 14
    • About us
      • Authors
    • Contact us
    • Privacy policy
    • Terms of use
    • Advertise
    • Newsletter
    • Post a Job
    • Partners
    Facebook X (Twitter) LinkedIn YouTube WhatsApp
    Innovation Village | Technology, Product Reviews, Business
    • Home
    • Innovation
      • Products
      • Technology
      • Internet of Things
    • Business
      • Agritech
      • Fintech
      • Healthtech
      • Investments
        • Cryptocurrency
      • People
      • Startups
      • Women In Tech
    • Media
      • Entertainment
      • Gaming
    • Reviews
      • Gadgets
      • Apps
      • How To
    • Giveaways
    • Jobs
    Innovation Village | Technology, Product Reviews, Business
    You are at:Home»News»Security Researchers Hack macOS With a Message on the TouchBar at Pwn2Own 2017
    Pwn2Own 2017

    Security Researchers Hack macOS With a Message on the TouchBar at Pwn2Own 2017

    0
    By Chidi on March 17, 2017 News

    I guess MacBook Pro’s Touch Bar isn’t as secure as we thought. Security researchers demonstrated multiple hacks of macOS on the first day of Pwn2Own 2017, including one that left a special message on the new MacBook’s TouchBar.

    Zero Day Initiative details the successful hacks of the day:

    Samuel Groß (@5aelo) and Niklas Baumstark (_niklasb) targeting Apple Safari with an escalation to root on macOS
    ● PARTIAL SUCCESS: In a partial win, Samuel Groß (@5aelo) and Niklas Baumstark (@_niklasb) earn some style points by leaving a special message on the touch bar of the Mac. They used a use-after-free (UAF) in Safari combined with three logic bugs and a null pointer dereference to exploit Safari and elevate to root in macOS. They still managed to earn $28,000 USD and 9 Master of Pwn points.

    Chaitin Security Research Lab (@ChaitinTech) targeting Apple Safari with an escalation to root on macOS
    ● SUCCESS: The Chaitin Security Research Lab (@ChaitinTech) successfuly exploited Apple Safari to gain root access on macOS by using a total of six bugs in their exploit chain including an info disclosure in Safari, four different type confusions bugs in the browser, and an a UAF in WindowServer. This earned the team $35,000 and 11 points towards Master of Pwn.


    ZDI is offering more than $1,000,000 across different categories to see the latest research and will again crown a Master of Pwn at the end of three days.

    This year’s event features 11 teams of contestants targeting products across four categories – 30 different attempts in total. Each contestant has three attempts within their allotted timeslot to demonstrate the exploit.

    Read More

    Related

    Share. Facebook Twitter Pinterest LinkedIn Email
    Chidi
    • Website
    • Facebook
    • X (Twitter)

    Tech & Gadget enthusiast | Apple fan | Sci-fi/Music lover | Software engineer

    Related Posts

    Cell C owner Blue Label plans strategic name change

    Comparison between the Z Fold6 and Z Fold7

    Bfree secures $3M investment from Verdant Capital

    Leave A Reply Cancel Reply

    You must be logged in to post a comment.

    Copyright ©, 2013-2024 Innovation-Village.com. All Rights Reserved

    Type above and press Enter to search. Press Esc to cancel.

     

    Loading Comments...
     

    You must be logged in to post a comment.