31 min listen
82: Master of Pwn
FromDarknet Diaries
ratings:
Length:
67 minutes
Released:
Jan 5, 2021
Format:
Podcast episode
Description
The Zero Day Initiative runs a hacker contest called Pwn2Own. The contest calls the best hackers in the world to demonstrate they can hack into software that should be secure. Like browsers, phones, and even cars. A lot of vulnerabilities are discovered from this event which means vendors must fix them. Whoever can demonstrate the most vulnerabilities will be crowned the “Master of Pwn”.
Thanks to Dustin Childs and Brian Gorenc from ZDI to hear all about Pwn2Own.
Thanks to Radek and Pedro for sharing their experiences of becoming the Masters of Pwn.
Sponsors
Support for this show comes from Blinkist. They offer thousands of condensed non-fiction books, so you can get through books in about 15 minutes. Check out Blinkist.com/DARKNET to start your 7 day free trial and get 25% off when you sign up.
Support for this show comes from Kars 4 Kids. Donate your car today, this organization will sell to use for their charity.
View all active sponsors.
Sources
https://www.forbes.com/profile/lee-junghoon/?sh=49ee055fc9c7
https://www.cyberscoop.com/pwn2own-chinese-researchers-360-technologies-trend-micro/
https://twitter.com/BrendanEich/status/697889208380293120
https://www.techtimes.com/articles/247111/20200130/google-bug-bounty-2019-became-the-highest-paid-google-hackers-reaching-6-5-million.htm
Thanks to Dustin Childs and Brian Gorenc from ZDI to hear all about Pwn2Own.
Thanks to Radek and Pedro for sharing their experiences of becoming the Masters of Pwn.
Sponsors
Support for this show comes from Blinkist. They offer thousands of condensed non-fiction books, so you can get through books in about 15 minutes. Check out Blinkist.com/DARKNET to start your 7 day free trial and get 25% off when you sign up.
Support for this show comes from Kars 4 Kids. Donate your car today, this organization will sell to use for their charity.
View all active sponsors.
Sources
https://www.forbes.com/profile/lee-junghoon/?sh=49ee055fc9c7
https://www.cyberscoop.com/pwn2own-chinese-researchers-360-technologies-trend-micro/
https://twitter.com/BrendanEich/status/697889208380293120
https://www.techtimes.com/articles/247111/20200130/google-bug-bounty-2019-became-the-highest-paid-google-hackers-reaching-6-5-million.htm
Released:
Jan 5, 2021
Format:
Podcast episode
Titles in the series (100)
Ep 19: Aurora: In 2009, around Christmas time, something terrible was lurking in the network at Google. Google is the most popular website on the Internet. It’s so popular many people just think Google is the Internet. Google hires many of the most talented minds and has been online since the 90s. Hacking into Google is no easy task. There’s a team of security engineers who test and check all the configurations on the site before they go live. And Google has teams of security analysts and technicians watching the network 24/7 for attacks, intrusions, and suspicious activity. Security plays a very vital role at Google, and everything has to have the best protections. But this attack slipped past all that. Hackers had found their way into the network. They compromised numerous systems, burrowed their way into Google’s servers, and were trying to get to data they shouldn’t be allowed to have. Google detected this activity. And realized pretty quickly they were dealing with an attack more by Darknet Diaries