{"id":7001,"date":"2017-03-15T17:00:08","date_gmt":"2017-03-16T01:00:08","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/03\/15\/news-792\/"},"modified":"2017-03-15T17:00:08","modified_gmt":"2017-03-16T01:00:08","slug":"news-792","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/03\/15\/news-792\/","title":{"rendered":"Pwn2Own 2017 \u2013 Day Two Schedule and Results"},"content":{"rendered":"<p><strong>Credit to Author: Dustin Childs (Zero Day Initiative Communications)| Date: Thu, 16 Mar 2017 00:03:58 +0000<\/strong><\/p>\n<p>With the unprecedented number of contestants and entries, the Zero Day Initiative is dividing today\u2019s schedule into two tracks. The first track will focus on attempts against Microsoft and Adobe products. Track Two focuses on products from Apple and Mozilla. This allows ZDI to get through twice the number of contestants in a single day during our largest ever Pwn2Own. We\u2019re thrilled at the level of participation for the 10th anniversary of Pwn2Own and look forward to awarding over $1,000,000 USD in prizes.<\/p>\n<p>The full schedule for Day Two is below (all times PDT). We will update this schedule with results as they become available.<\/p>\n<div class=\"lightTable\">\n<table width=\"1007\">\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"475\">TRACK A<\/td>\n<td colspan=\"2\" width=\"532\">TRACK B<\/td>\n<\/tr>\n<tr>\n<td width=\"109\">8:30am<\/td>\n<td width=\"365\">360 Security (<a href=\"https:\/\/twitter.com\/mj0011sec\">@mj0011sec<\/a>) targeting Adobe Flash with a SYSTEM-level escalation and a virtual machine escape<\/td>\n<td width=\"109\">9:15am<\/td>\n<td width=\"423\">Tencent Security &#8211; Team Shield (Keen Lab and PC Mgr) targeting Apple macOS<\/td>\n<\/tr>\n<tr>\n<td width=\"109\">10:00am<\/td>\n<td width=\"365\">Tencent Security &#8211; Team Sniper (Keen Lab and PC Mgr) targeting Adobe Flash with a SYSTEM-level escalation<\/td>\n<td width=\"109\">10:45am<\/td>\n<td width=\"423\">360 Security (<a href=\"https:\/\/twitter.com\/mj0011sec\">@mj0011sec<\/a>) targeting macOS<\/p>\n<p>&nbsp;<\/td>\n<\/tr>\n<tr>\n<td width=\"109\">11:00am<\/td>\n<td width=\"365\">Tencent Security &#8211; Lance Team targeting Microsoft Edge with a SYSTEM-level escalation<\/td>\n<td width=\"109\">11:45am<\/td>\n<td width=\"423\">360 Security (<a href=\"https:\/\/twitter.com\/mj0011sec\">@mj0011sec<\/a>) targeting Apple Safari with an escalation to root on macOS<\/td>\n<\/tr>\n<tr>\n<td width=\"109\">12:00pm<\/td>\n<td width=\"365\">Tencent Security &#8211; Sword Team targeting Microsoft Edge<\/td>\n<td width=\"109\">1:00pm<\/td>\n<td width=\"423\">Chaitin Security Research Lab (<a href=\"https:\/\/twitter.com\/ChaitinTech\">@ChaitinTech<\/a>) targeting macOS<\/td>\n<\/tr>\n<tr>\n<td width=\"109\">1:30pm<\/td>\n<td width=\"365\">Tencent Security &#8211; Lance Team targeting Microsoft Windows<\/td>\n<td width=\"109\">2:00pm<\/td>\n<td width=\"423\">Tencent Security &#8211; Team Sniper (Keen Lab and PC Mgr) targeting Apple macOS<\/td>\n<\/tr>\n<tr>\n<td width=\"109\">2:30pm<\/td>\n<td width=\"365\">Tencent Security &#8211; Team Shield (Keen Lab and PC Mgr) targeting Microsoft Edge with a SYSTEM-level escalation<\/td>\n<td width=\"109\">3:00pm<\/td>\n<td width=\"423\">Moritz Jodeit, Blue Frost Security (<a href=\"https:\/\/twitter.com\/moritzj\">@moritzj<\/a>) targeting Mozilla Firefox<\/td>\n<\/tr>\n<tr>\n<td width=\"109\">3:30pm<\/td>\n<td width=\"365\">Tencent Security &#8211; Team Sniper (Keen Lab and PC Mgr) targeting Microsoft Edge with a SYSTEM-level escalation<\/td>\n<td width=\"109\">4:00pm<\/td>\n<td width=\"423\">Chaitin Security Research Lab (<a href=\"https:\/\/twitter.com\/ChaitinTech\">@ChaitinTech<\/a>) targeting Mozilla Firefox with a SYSTEM-level escalation<\/td>\n<\/tr>\n<tr>\n<td width=\"109\">4:30pm<\/td>\n<td width=\"365\">360 Security (<a href=\"https:\/\/twitter.com\/mj0011sec\">@mj0011sec<\/a>) targeting Microsoft Windows<\/td>\n<td width=\"109\">5:00pm<\/td>\n<td width=\"423\">Tencent Security &#8211; Team Sniper (Keen Lab and PC Mgr) targeting VMWare Workstation (Guest-to-Host)<\/td>\n<\/tr>\n<tr>\n<td width=\"109\">6:00pm<\/td>\n<td width=\"365\">Tencent Security &#8211; Team Sniper (Keen Lab and PC Mgr) targeting Microsoft Windows<\/td>\n<td width=\"109\">7:30pm<\/td>\n<td width=\"423\">Tencent Security &#8211; Team Sniper (Keen Lab and PC Mgr) targeting Apple Safari with an escalation to root on macOS<\/td>\n<\/tr>\n<\/tbody>\n<\/table><\/div>\n<p>&nbsp;<\/p>\n<p>We\u2019ll update this blog with results as they become available. Follow us on <a href=\"https:\/\/twitter.com\/thezdi\">Twitter<\/a> for the latest information, including a wrap of Day One and the schedule for Day Three.<\/p>\n<p><a href=\"http:\/\/blog.trendmicro.com\/pwn2own-2017-day-two-schedule-results\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Dustin Childs (Zero Day Initiative Communications)| Date: Thu, 16 Mar 2017 00:03:58 +0000<\/strong><\/p>\n<p>With the unprecedented number of contestants and entries, the Zero Day Initiative is dividing today\u2019s schedule into two tracks. The first track will focus on attempts against Microsoft and Adobe products. Track Two focuses on products from Apple and Mozilla. This allows ZDI to get through twice the number of contestants in a single day&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[10416,10415],"class_list":["post-7001","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-pwn2own","tag-zero-day-initiative"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7001","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7001"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7001\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7001"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7001"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7001"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}