#pwn2own search results

Confirmed (with style!) - Interrupt Labs combined a path traversal and an untrusted search path bug to exploit the Lexmark CX532adwe. They got a reverse shell and loaded Doom on the LCD. We couldn't play it though :-[ Still awesome to see. #Pwn2Own

thezdi's tweet image. Confirmed (with style!) - Interrupt Labs combined a path traversal and an untrusted search path bug to exploit the Lexmark CX532adwe. They got a reverse shell and loaded Doom on the LCD. We couldn't play it though :-[ Still awesome to see. #Pwn2Own
thezdi's tweet image. Confirmed (with style!) - Interrupt Labs combined a path traversal and an untrusted search path bug to exploit the Lexmark CX532adwe. They got a reverse shell and loaded Doom on the LCD. We couldn't play it though :-[ Still awesome to see. #Pwn2Own

Seconds to spare and $40,000 on the line: @SinSinology of @SummoningTeam and the @theZDI team celebrate his successful exploit of Synology DiskStation DS925+ in the Network Attached Storage category at Pwn2Own Ireland. trendmicro.com/en_us/zero-day… #Pwn2Own


We have reproduced "ToolShell", the unauthenticated exploit chain for CVE-2025-49706 + CVE-2025-49704 used by @_l0gg to pop SharePoint at #Pwn2Own Berlin 2025, it's really just one request! Kudos to @mwulftange

codewhitesec's tweet image. We have reproduced "ToolShell", the unauthenticated exploit chain for CVE-2025-49706 + CVE-2025-49704 used by @_l0gg to pop SharePoint at #Pwn2Own Berlin 2025, it's really just one request! Kudos to @mwulftange

Everything is happening so quick.. Tesla got pwned in seconds..well done .. #pwn2own

Kevin2600's tweet image. Everything is happening so quick.. Tesla got pwned in seconds..well done .. #pwn2own
Kevin2600's tweet image. Everything is happening so quick.. Tesla got pwned in seconds..well done .. #pwn2own
Kevin2600's tweet image. Everything is happening so quick.. Tesla got pwned in seconds..well done .. #pwn2own
Kevin2600's tweet image. Everything is happening so quick.. Tesla got pwned in seconds..well done .. #pwn2own

Confirmed! Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) used a hard-coded cred and an injection to take over the QNAP TS-453E. These unique bugs earn him $20,000 and 4 Master of Pwn points. #Pwn2Own

thezdi's tweet image. Confirmed! Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) used a hard-coded cred and an injection to take over the  QNAP TS-453E. These unique bugs earn him $20,000 and 4 Master of Pwn points. #Pwn2Own
thezdi's tweet image. Confirmed! Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) used a hard-coded cred and an injection to take over the  QNAP TS-453E. These unique bugs earn him $20,000 and 4 Master of Pwn points. #Pwn2Own

Confirmed! David Berard of @synacktiv used a pair of bugs to exploit the Ubiquiti AI Pro in the Surveillance Systems category. The impressive display (incl. a round of Baby Shark) earns him $30,000 and 3 Master of Pwn Points. #Pwn2Own

thezdi's tweet image. Confirmed! David Berard of @synacktiv used a pair of bugs to exploit the Ubiquiti AI Pro in the Surveillance Systems category. The impressive display (incl. a round of Baby Shark) earns him $30,000 and 3 Master of Pwn Points. #Pwn2Own
thezdi's tweet image. Confirmed! David Berard of @synacktiv used a pair of bugs to exploit the Ubiquiti AI Pro in the Surveillance Systems category. The impressive display (incl. a round of Baby Shark) earns him $30,000 and 3 Master of Pwn Points. #Pwn2Own

Confirmed! namnp of Viettel Cyber Security used a crypto bypass and a heap overflow to exploit the Phillips Hue Bridge. They earn $20,000 and 4 Master of Pwn points, which catapults them in the Top 5. It also puts us over $1,000,000 for the contest! #Pwn2Own

thezdi's tweet image. Confirmed! namnp of Viettel Cyber Security used a crypto bypass and a heap overflow to exploit the Phillips Hue Bridge. They earn $20,000 and 4 Master of Pwn points, which catapults them in the Top 5. It also puts us over $1,000,000 for the contest! #Pwn2Own
thezdi's tweet image. Confirmed! namnp of Viettel Cyber Security used a crypto bypass and a heap overflow to exploit the Phillips Hue Bridge. They earn $20,000 and 4 Master of Pwn points, which catapults them in the Top 5. It also puts us over $1,000,000 for the contest! #Pwn2Own

Had an awesome time presenting the PoolParty research at @CanSecWest Great talks and people! Also super cool watching Pwn2own in person, big congrats to the contestants! #CanSecWest #Pwn2Own

alon_leviev's tweet image. Had an awesome time presenting the PoolParty research at @CanSecWest

Great talks and people! 

Also super cool watching Pwn2own in person, big congrats to the contestants!

#CanSecWest #Pwn2Own

We have another collision! Bongeun Koo (@kiddo_pwn) and Evangelos Daravigkas (@freddo_1337) of Team DDOS used a single bug to exploit the QNAP TS-453E, but the bug has been previously seen in the contest. Their work still earns them $10,000 and 2 Master of Pwn points. #Pwn2Own

thezdi's tweet image. We have another collision! Bongeun Koo (@kiddo_pwn) and Evangelos Daravigkas (@freddo_1337) of Team DDOS used a single bug to exploit the QNAP TS-453E, but the bug has been previously seen in the contest. Their work still earns them $10,000 and 2 Master of Pwn points. #Pwn2Own
thezdi's tweet image. We have another collision! Bongeun Koo (@kiddo_pwn) and Evangelos Daravigkas (@freddo_1337) of Team DDOS used a single bug to exploit the QNAP TS-453E, but the bug has been previously seen in the contest. Their work still earns them $10,000 and 2 Master of Pwn points. #Pwn2Own

Another amazing #Pwn2Own in the books! 💪 Our team pulled off some great hacks: 🖨️ HP Printer — $20K / 2 MoP 🏠 Home Assistant — $15K / 3 MoP 🔌 Smart Plug — $20K / 2 MoP 📸 Canon — $10K / 2 MoP Total: $65K / 9 MoP So proud of what we achieved together! 🧠⚡

Neodyme's tweet image. Another amazing #Pwn2Own in the books! 💪 
Our team pulled off some great hacks: 
🖨️ HP Printer — $20K / 2 MoP 
🏠 Home Assistant — $15K / 3 MoP 
🔌 Smart Plug — $20K / 2 MoP 
📸 Canon — $10K / 2 MoP 
Total: $65K / 9 MoP 
So proud of what we achieved together! 🧠⚡
Neodyme's tweet image. Another amazing #Pwn2Own in the books! 💪 
Our team pulled off some great hacks: 
🖨️ HP Printer — $20K / 2 MoP 
🏠 Home Assistant — $15K / 3 MoP 
🔌 Smart Plug — $20K / 2 MoP 
📸 Canon — $10K / 2 MoP 
Total: $65K / 9 MoP 
So proud of what we achieved together! 🧠⚡

What a beautiful day to Pwn #Pwn2Own

Kevin2600's tweet image. What a beautiful day to Pwn #Pwn2Own

For the past 3 years, participating in #Pwn2Own had been a dream for me. I could have never asked for a better debut! All of that would not have been possible without my teammate -and buddy - @kiddo_pwn. His work throughout this time has been outstanding! A huge thanks to all of…

freddo_1337's tweet image. For the past 3 years, participating in #Pwn2Own had been a dream for me. I could have never asked for a better debut! All of that would not have been possible without my teammate -and buddy - @kiddo_pwn. His work throughout this time has been outstanding!

A huge thanks to all of…

🎉 Big win at #Pwn2Own Cork! @_p0ly_ of @Synacktiv successfully breached the @Ubiquiti AI Pro surveillance system 🦈🎶 What a way to wrap up the challenge - congrats, @_p0ly_ 💪

Synacktiv's tweet image. 🎉 Big win at #Pwn2Own Cork!

@_p0ly_ of @Synacktiv successfully breached the @Ubiquiti AI Pro surveillance system 🦈🎶

What a way to wrap up the challenge - congrats, @_p0ly_ 💪

🔥 First time at #Pwn2Own, first win — and $15,000 later, we’re just getting started. Last week at @OffensiveCon, we trained, fuzzed, and pwned hard. Here’s the story 👇

FuzzingLabs's tweet image. 🔥 First time at #Pwn2Own, first win — and $15,000 later, we’re just getting started.

Last week at @OffensiveCon, we trained, fuzzed, and pwned hard. Here’s the story 👇

#Pwn2Own and #F1 have a lot in common: Professionals at the top of their game, doing what few people can do.


If a zero-day exploit hits your @Sonos smart speakers and nobody is around to hear it, will they really make a sound? 👀 Find out next week at #Pwn2Own Ireland! #RCE #exploit #0day

ret2systems's tweet image. If a zero-day exploit hits your @Sonos smart speakers and nobody is around to hear it, will they really make a sound? 👀 Find out next week at #Pwn2Own Ireland! #RCE #exploit #0day

20 years and over 14K advisories published. Trend's @thezdi has been busy 🥵 #Pwn2Own

TrendMicro's tweet image. 20 years and over 14K advisories published. Trend's @thezdi has been busy 🥵 #Pwn2Own

Targeting the CHAR-X SEC-3150 controller for Pwn2Own automotive 2025 ? We released tooling to do full system emulation last year so you can work on your ROP chain while sipping Mate away from the lab :) github.com/onekey-sec/BHE… #Pwn2Own #Pwn2OwnAutomotive

qkaiser's tweet image. Targeting the CHAR-X SEC-3150 controller for Pwn2Own automotive 2025 ? We released tooling to do full system emulation last year so you can work on your ROP chain while sipping Mate away from the lab :) github.com/onekey-sec/BHE…

#Pwn2Own #Pwn2OwnAutomotive
qkaiser's tweet image. Targeting the CHAR-X SEC-3150 controller for Pwn2Own automotive 2025 ? We released tooling to do full system emulation last year so you can work on your ROP chain while sipping Mate away from the lab :) github.com/onekey-sec/BHE…

#Pwn2Own #Pwn2OwnAutomotive
qkaiser's tweet image. Targeting the CHAR-X SEC-3150 controller for Pwn2Own automotive 2025 ? We released tooling to do full system emulation last year so you can work on your ROP chain while sipping Mate away from the lab :) github.com/onekey-sec/BHE…

#Pwn2Own #Pwn2OwnAutomotive

Currently on stage at @sth4ck , @_cryptocorn_ with her colleague @Mad5quirrel for sharing their research on firmware done for #pwn2own 🤩 #proudfather ❤️

cbrocas's tweet image. Currently on stage at @sth4ck , @_cryptocorn_ with her colleague @Mad5quirrel for sharing their research on firmware done for #pwn2own 🤩 

#proudfather ❤️

A big shout-out to the @Synacktiv team for their strong performance at the latest #Pwn2Own competition in Cork! They proudly secured third place overall 👏 Next stop: Tokyo for the upcoming edition 🇯🇵 👀 More details on the targets and participants here ℹ️…

Synacktiv's tweet image. A big shout-out to the @Synacktiv team for their strong performance at the latest #Pwn2Own competition in Cork!
They proudly secured third place overall 👏

Next stop: Tokyo for the upcoming edition 🇯🇵 👀

More details on the targets and participants here ℹ️…

Congrats on the win! #Pwn2Own is no joke. What was the most interesting vuln you guys hit?


Pwn2Own event revealed 73 zero-day vulnerabilities, awarding participants a total of $1 million for identifying significant cybersecurity issues. #CyberSecurity #ZeroDay #Pwn2Own #VulnerabilityResearch techday.asia/story/pwn2own-…


سینا خیرخواه بهمراه تیمش، پادشاه Pwn2Own Ireland 2025 شد. در این پست نگاهی به مسابقات Pwn2Own Ireland 2025 انداختیم که با قهرمانیSummoning Team، گزارش 73 زیرودی و بانتی 1,024,750 دلاری تمام شد. onhexgroup.ir/pwn2own-irelan… #Pwn2Own #Pwn2OwnIreland2025 #ZDI #0day

onhexgroup.ir

سینا خیرخواه بهمراه تیمش، پادشاه Pwn2Own Ireland 2025 شد

در این پست نگاهی به مسابقات Pwn2Own Ireland 2025 انداختیم که با قهرمانیSummoning Team، گزارش 73 زیرودی و بانتی 1,024,750 دلاری تمام شد.


A #Pwn2Own event with a humanoid category would be wild. Threat model: compromised update server, malicious motion planning commands, or just good old buffer overflow in the vision processing stack. Pick your vector and OWN the humanoids. 🤖

Soo who’s gonna be the first to dump the firmware on this!



فريق Z3 حصل على أكبر جائزة في حدث #Pwn2Own وقدرها مليون دولار بعد ان اكتشف ثغرة خطيرة “0click 0day” في الواتساب تسمح بإدخال وتنفيذ كود ضار على جهاز الضحية دون أي تفاعل من المستخدم الغريب بالأمر ان الفريق انسحب ولم يستلم الجائزة بحجة ان العرض غير جاهز!! #CTF #0day

_YMT_'s tweet image. فريق Z3 حصل على أكبر جائزة
في حدث #Pwn2Own وقدرها مليون دولار
بعد ان اكتشف ثغرة خطيرة “0click 0day”
في الواتساب تسمح  بإدخال وتنفيذ كود ضار على جهاز الضحية دون أي تفاعل من المستخدم 

الغريب بالأمر ان الفريق انسحب ولم يستلم
الجائزة بحجة ان العرض غير جاهز!!
#CTF #0day

Proběhla hackerská soutěž #Pwn2Own Ireland 2025 organizována @thezdi a @TrendMicro. Vyplaceno bylo 1 024 750 dolarů za 73 unikátních zranitelností nultého dne (0-day). Vítězný Summoning Team @SummoningTeam pod vedením @SinSinology si odnesl 187 500 dolarů.


For the past 3 years, participating in #Pwn2Own had been a dream for me. I could have never asked for a better debut! All of that would not have been possible without my teammate -and buddy - @kiddo_pwn. His work throughout this time has been outstanding! A huge thanks to all of…

freddo_1337's tweet image. For the past 3 years, participating in #Pwn2Own had been a dream for me. I could have never asked for a better debut! All of that would not have been possible without my teammate -and buddy - @kiddo_pwn. His work throughout this time has been outstanding!

A huge thanks to all of…

3 years of work — released. Respect to the researcher. 🔥 #Pwn2Own

It took 3 years but finally I feel ready to release my Pwn2Own 2021 exploit code. 💖 Video talk covers my full research workflow, from attack surface modeling and reverse engineering, to vulnerability discovery and systematic exploit engineering, enjoy! #Pwn2Own



Summoning Team won Master of #Pwn as #Pwn2Own #Ireland Rewards $1,024,750 #USD1024K ift.tt/fhLXdCM

omvapt's tweet image. Summoning Team won Master of #Pwn as #Pwn2Own #Ireland Rewards $1,024,750  #USD1024K
ift.tt/fhLXdCM

#Pwn2Own and #F1 have a lot in common: Professionals at the top of their game, doing what few people can do.


Another #Pwn2Own in the books. These events showcase the best vulnerability research happening right now, and watching the community come together around it never gets old. Congrats to everyone who participated. #P2OIreland

Wrapping up #Pwn2Own Ireland 2025. The three day event saw some amazing exploits and traumatic failures. We laughed, we cried, we shouted. Check out the highlights and see who won Master of Pwn. #P2OIreland youtu.be/ruxOpC-b-yM?si…

thezdi's tweet card. Wrapping Up Pwn2Own Ireland 2025

youtube.com

YouTube

Wrapping Up Pwn2Own Ireland 2025



#Hackers earn #USD124K $1,024,750 for 73 zero-days at #Pwn2Own #Ireland ift.tt/kD0bUgJ

omvapt's tweet image. #Hackers earn #USD124K $1,024,750 for 73 zero-days at #Pwn2Own #Ireland 
ift.tt/kD0bUgJ

At Hacking event if they had demonstrated it, they might have won 1 Million Dollars 💵 but they didn’t demonstrated. Why was that ? Does Meta giving more than this or there is something else, blackmarket game or what ? 🙄🙄 @whatsappzeroday #pwn2own #trendmicro #zerodayexploit


HackRead: Hackers racked up over $1 M at #Pwn2Own 2025 in Ireland, breaching everything from printers to NAS devices and smart home gear as #SummoningTeam claimed the Master of Pwn title. 💥🔐 Read the full breakdown: hackread.com/pwn2own-irelan… #Cybersecurity #Infosec #0day #I


Hackers racked up over $1 M at #Pwn2Own 2025 in Ireland, breaching everything from printers to NAS devices and smart home gear as #SummoningTeam claimed the Master of Pwn title. 💥🔐 Read the full breakdown: hackread.com/pwn2own-irelan… #Cybersecurity #Infosec #0day #Ireland


💥 73 zero-daye i ponad 1 mln USD nagród. Wczoraj zakończyło się #Pwn2Own Ireland 2025 – rekordowa liczba exploitów w routerach, NAS-ach, drukarkach i smart home. Najczęstsze wektory: buffer overflow, command injection, SSRF, format string.

getriffsec's tweet image. 💥 73 zero-daye i ponad 1 mln USD nagród.

Wczoraj zakończyło się #Pwn2Own Ireland 2025 – rekordowa liczba exploitów w routerach, NAS-ach, drukarkach i smart home.

Najczęstsze wektory: buffer overflow, command injection, SSRF, format string.

انسحاب تكتيكي لteam z3 من عرض كشف تغرة 0click في واتساب بقيمة مليون دولار في p2o #pwn2own اشهر ضحية كانت هاتف سامسونج s25 .. انتظروا الترقيعات لتغرات 😁😎


Confirmed (with style!) - Interrupt Labs combined a path traversal and an untrusted search path bug to exploit the Lexmark CX532adwe. They got a reverse shell and loaded Doom on the LCD. We couldn't play it though :-[ Still awesome to see. #Pwn2Own

thezdi's tweet image. Confirmed (with style!) - Interrupt Labs combined a path traversal and an untrusted search path bug to exploit the Lexmark CX532adwe. They got a reverse shell and loaded Doom on the LCD. We couldn't play it though :-[ Still awesome to see. #Pwn2Own
thezdi's tweet image. Confirmed (with style!) - Interrupt Labs combined a path traversal and an untrusted search path bug to exploit the Lexmark CX532adwe. They got a reverse shell and loaded Doom on the LCD. We couldn't play it though :-[ Still awesome to see. #Pwn2Own

We have reproduced "ToolShell", the unauthenticated exploit chain for CVE-2025-49706 + CVE-2025-49704 used by @_l0gg to pop SharePoint at #Pwn2Own Berlin 2025, it's really just one request! Kudos to @mwulftange

codewhitesec's tweet image. We have reproduced "ToolShell", the unauthenticated exploit chain for CVE-2025-49706 + CVE-2025-49704 used by @_l0gg to pop SharePoint at #Pwn2Own Berlin 2025, it's really just one request! Kudos to @mwulftange

Ninjas are getting ready for #P2OVancouver 💪 #Pwn2Own

Synacktiv's tweet image. Ninjas are getting ready for #P2OVancouver 💪 #Pwn2Own

Everything is happening so quick.. Tesla got pwned in seconds..well done .. #pwn2own

Kevin2600's tweet image. Everything is happening so quick.. Tesla got pwned in seconds..well done .. #pwn2own
Kevin2600's tweet image. Everything is happening so quick.. Tesla got pwned in seconds..well done .. #pwn2own
Kevin2600's tweet image. Everything is happening so quick.. Tesla got pwned in seconds..well done .. #pwn2own
Kevin2600's tweet image. Everything is happening so quick.. Tesla got pwned in seconds..well done .. #pwn2own

Confirmed! David Berard of @synacktiv used a pair of bugs to exploit the Ubiquiti AI Pro in the Surveillance Systems category. The impressive display (incl. a round of Baby Shark) earns him $30,000 and 3 Master of Pwn Points. #Pwn2Own

thezdi's tweet image. Confirmed! David Berard of @synacktiv used a pair of bugs to exploit the Ubiquiti AI Pro in the Surveillance Systems category. The impressive display (incl. a round of Baby Shark) earns him $30,000 and 3 Master of Pwn Points. #Pwn2Own
thezdi's tweet image. Confirmed! David Berard of @synacktiv used a pair of bugs to exploit the Ubiquiti AI Pro in the Surveillance Systems category. The impressive display (incl. a round of Baby Shark) earns him $30,000 and 3 Master of Pwn Points. #Pwn2Own

Another big confirmation! Ben R. And Georgi G. of Interrupt Labs used an improper input validation bug to take over the Samsung Galaxy S25 - enabling the camera and location tracking in the process. They earn $50,000 and 5 Master of Pwn points. #Pwn2Own

thezdi's tweet image. Another big confirmation! Ben R. And Georgi G.  of Interrupt Labs used an improper input validation bug to take over the Samsung Galaxy S25 - enabling the camera and location tracking in the process. They earn $50,000 and 5 Master of Pwn points. #Pwn2Own
thezdi's tweet image. Another big confirmation! Ben R. And Georgi G.  of Interrupt Labs used an improper input validation bug to take over the Samsung Galaxy S25 - enabling the camera and location tracking in the process. They earn $50,000 and 5 Master of Pwn points. #Pwn2Own

Things are going pretty well so far 🚗 #Pwn2Own

Synacktiv's tweet image. Things are going pretty well so far 🚗 #Pwn2Own

Here we are! 🥷 Masters of pwn for the third time 🎉 Congratulations to all the ninjas involved! #Pwn2Own

Synacktiv's tweet image. Here we are! 🥷 Masters of pwn for the third time 🎉 Congratulations to all the ninjas involved! #Pwn2Own
Synacktiv's tweet image. Here we are! 🥷 Masters of pwn for the third time 🎉 Congratulations to all the ninjas involved! #Pwn2Own

What a beautiful day to Pwn #Pwn2Own

Kevin2600's tweet image. What a beautiful day to Pwn #Pwn2Own

Yay @defcon Talk Yay with @040xZx about our Xiaomi #pwn2own "experience" #DEFCON32 #DEFCON

Yogehi's tweet image. Yay @defcon Talk Yay with @040xZx about our Xiaomi #pwn2own "experience"

#DEFCON32 #DEFCON

Wow!! Thank you ALL for so much support on my first #Pwn2Own win!! I’m very lucky to have a team and leadership that believes in me. I’m really proud of this bug; this is one of hardest exploits I’ve ever written. I can’t wait to share the details with you once it’s patched!

chompie1337's tweet image. Wow!! Thank you ALL for so much support on my first #Pwn2Own win!! I’m very lucky to have a team and leadership  that believes in me. I’m really proud of this bug; this is one of hardest exploits I’ve ever written. I can’t wait to share the details with you once it’s patched!

Confirmed! namnp of Viettel Cyber Security used a crypto bypass and a heap overflow to exploit the Phillips Hue Bridge. They earn $20,000 and 4 Master of Pwn points, which catapults them in the Top 5. It also puts us over $1,000,000 for the contest! #Pwn2Own

thezdi's tweet image. Confirmed! namnp of Viettel Cyber Security used a crypto bypass and a heap overflow to exploit the Phillips Hue Bridge. They earn $20,000 and 4 Master of Pwn points, which catapults them in the Top 5. It also puts us over $1,000,000 for the contest! #Pwn2Own
thezdi's tweet image. Confirmed! namnp of Viettel Cyber Security used a crypto bypass and a heap overflow to exploit the Phillips Hue Bridge. They earn $20,000 and 4 Master of Pwn points, which catapults them in the Top 5. It also puts us over $1,000,000 for the contest! #Pwn2Own

Competing in #Pwn2Own 2021 Austin: Icarus at the Zenith by @0vercl0k doar-e.github.io/blog/2022/03/2…

SinSinology's tweet image. Competing in #Pwn2Own 2021 Austin: Icarus at the Zenith by @0vercl0k 

doar-e.github.io/blog/2022/03/2…
SinSinology's tweet image. Competing in #Pwn2Own 2021 Austin: Icarus at the Zenith by @0vercl0k 

doar-e.github.io/blog/2022/03/2…

Now, @masthoon and @MajorTomSec are on stage to present their VirtualBox chain used during #Pwn2Own

Synacktiv's tweet image. Now, @masthoon and @MajorTomSec are on stage to present their VirtualBox chain used during #Pwn2Own

Confirmed! Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) used a hard-coded cred and an injection to take over the QNAP TS-453E. These unique bugs earn him $20,000 and 4 Master of Pwn points. #Pwn2Own

thezdi's tweet image. Confirmed! Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) used a hard-coded cred and an injection to take over the  QNAP TS-453E. These unique bugs earn him $20,000 and 4 Master of Pwn points. #Pwn2Own
thezdi's tweet image. Confirmed! Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) used a hard-coded cred and an injection to take over the  QNAP TS-453E. These unique bugs earn him $20,000 and 4 Master of Pwn points. #Pwn2Own

Confirmed! Chris Anastasio of Team Cluck used a single type confusion bug to exploit the Lexmark CX532adwe printer. He earns himself $20,000 and 2 Master of Pwn points. #Pwn2Own

thezdi's tweet image. Confirmed! Chris Anastasio of Team Cluck used a single type confusion bug to exploit the Lexmark CX532adwe printer. He earns himself $20,000 and 2 Master of Pwn points. #Pwn2Own
thezdi's tweet image. Confirmed! Chris Anastasio of Team Cluck used a single type confusion bug to exploit the Lexmark CX532adwe printer. He earns himself $20,000 and 2 Master of Pwn points. #Pwn2Own

Had an awesome time presenting the PoolParty research at @CanSecWest Great talks and people! Also super cool watching Pwn2own in person, big congrats to the contestants! #CanSecWest #Pwn2Own

alon_leviev's tweet image. Had an awesome time presenting the PoolParty research at @CanSecWest

Great talks and people! 

Also super cool watching Pwn2own in person, big congrats to the contestants!

#CanSecWest #Pwn2Own

For the past 3 years, participating in #Pwn2Own had been a dream for me. I could have never asked for a better debut! All of that would not have been possible without my teammate -and buddy - @kiddo_pwn. His work throughout this time has been outstanding! A huge thanks to all of…

freddo_1337's tweet image. For the past 3 years, participating in #Pwn2Own had been a dream for me. I could have never asked for a better debut! All of that would not have been possible without my teammate -and buddy - @kiddo_pwn. His work throughout this time has been outstanding!

A huge thanks to all of…

Peter @bl4sty is the only one who owns #Pwn2Own targets remotely while partying at #TheSAS2024

oct0xor's tweet image. Peter @bl4sty is the only one who owns #Pwn2Own targets remotely while partying at #TheSAS2024
oct0xor's tweet image. Peter @bl4sty is the only one who owns #Pwn2Own targets remotely while partying at #TheSAS2024

Loading...

Something went wrong.


Something went wrong.


United States Trends