Hacker News new | past | comments | ask | show | jobs | submit login
All Chrome OS hack attempts fail at Pwnium 3 (geek.com)
85 points by memoryfailure on March 8, 2013 | hide | past | favorite | 30 comments



Submitter is a spam account by Ziff Davis (geek.com / extremetech.com / pcmag.com / etc), one of a few they use to spam HN.


I've never understood why people care about this. Lots of people submit their own stuff. All I care about is the quality of the articles and discussion, which is orthogonal to the identity of the submitter.


Why would you not care if people are here to exploit you and the rest of this community?

Almost nobody unaffiliated submits their crap in spite of a year+ of spamming with about 8 different accounts so obviously their work is not even very relevant.

Systematic spam by these guys and a handful of other sites drowns out content real users find legitimately interesting.



This website is horrendous. While opening the page, a overlay banner flashes across the content area at snail speed but high enough that I cannot accurately click the close button while it's moving (well i can try but I'm risking clicking on the actual ad itself). It took a total of 10 seconds for it to completely cross the page before I was able to start reading the content.

I think this kind of ad serves absolutely no purpose. Even if I wanted to read it before I wouldn't now, and it totally killed the website's credibility for me.


I'm not sure hackers brought their "A" game to this event. In contrast to earlier events, winners must disclose their methods to participate in return for only $150,000 per exploit. A black hat hacker could make much more from their methods, and a white hat hacker could as well--in consulting fees.


You're thinking of Pwn2Own. Pwnium has always required disclosure, while Pwn2Own only required full disclosure for the first time this year.

And $150,000 is actually getting quite close to what you could make for an exploit of a browser on the black market, especially with all those Java and Flash plugins still running all over the world, depressing exploit prices as long as they're available.


It seems like there would not be a huge payday for Chrome OS exploits since hardly anyone uses the OS.


Are their rates that high? How much do those hackers earn then?


The fact that the total prize money is Pi million dollars is adorable.


That's irrational, sorry.


At least its not imaginary...


Technically Pi is a complex number that has the real number coefficient a = Pi and b = 0 resulting in a complex number of pi + 0j. This is because the set of real numbers is a subset of the set of complex numbers and Pi is an element of the set of real numbers.


It's still not (0) imaginary.


Money is always rational.


But for a 100m radius it is accurate to 36 microns.


[deleted]


How is that relevant?


On the whole, you should get real if you want to be rational.


also, minix didnt get pwned.


This comment made me unreasonably happy.


... but nobody talks about this! Shamefull.


Plain Chrome in Linux faired similarly didn't it?


"Chrome was compromised using similar methods to the IE10 and Firefox attacks. MWR Labs bypassed Chrome’s sandbox and used a Windows kernel vulnerability in Windows 7 to elevate privileges as well as execute commands outside of the sandbox. In addition to executing code, MWR researchers were able to read memory and find the base addresses of certain .DLL files."

http://www.geek.com/articles/geek-pick/internet-explorer-10-...


As one of the owners of the Chrome Windows sandbox, that level of inaccuracy hurts to read. The correct statement is that Nils and Jon's pwn2own exploit bypassed the sandbox by using a Windows kernel vulnerability that's exposed in every process on the system. You can argue about the extent to which you should be able to rely on the kernel to enforce its guarantees, but the component that failed isn't a point of debate.


Since that page does not mention Linux, I cannot imagine what relevance it has to grandparent.


Yeah, my mistake, I meant it to be in response to mtgx


So the other Chrome hacks were managed through Windows/Mac OS exploits?


Maybe it was just attacked on Windows, the only reference I can find is not super technical and references "zero-days" in the browser itself.


The sources I've seen all refer to a Windows stack-overflow / exploit.


There was a type confusion in WebKit that got code execution inside the sandbox, and then a Windows kernel vulnerability to break out.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: