{"id":6989,"date":"2017-03-15T10:00:11","date_gmt":"2017-03-15T18:00:11","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/03\/15\/news-780\/"},"modified":"2017-03-15T10:00:11","modified_gmt":"2017-03-15T18:00:11","slug":"news-780","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/03\/15\/news-780\/","title":{"rendered":"Welcome to Pwn2Own 2017 \u2013 The Schedule"},"content":{"rendered":"<p><strong>Credit to Author: Dustin Childs (Zero Day Initiative Communications)| Date: Wed, 15 Mar 2017 16:59:01 +0000<\/strong><\/p>\n<p>Welcome to Pwn2Own 2017 &#8211; the tenth anniversary of the competition and our largest Pwn2Own ever.\u00a0This is also our largest contest ever with over $1,000,000 USD up for the taking \u2013 and continuing what we started last year, we\u2019ll crown a \u201cMaster of Pwn\u201d as the overall winner on Day Three.<\/p>\n<p><iframe loading=\"lazy\"  src=\"https:\/\/www.youtube.com\/embed\/ksX5pIeETxE?feature=oembed\" width=\"100%\" height=\"420\" frameborder=\"0\" ><\/iframe> <\/p>\n<p>As we do every year, the competition order was decided by random drawing in the contest room on the first day of the competition. This year&#8217;s event features 11 teams of contestants targeting products across four categories &#8211; 30 different attempts in total. Each contestant haves three attempts within their allotted timeslot to demonstrate the exploit.<\/p>\n<p>The full schedule for Day One is below (all times PDT). We will update this schedule with results as they become available.<\/p>\n<p><strong>Day One &#8211; March 15, 2017<\/strong><\/p>\n<p>10:00am &#8211; 360 Security (<a href=\"https:\/\/twitter.com\/mj0011sec\">@mj011sec<\/a>) targeting Adobe Reader<\/p>\n<p>11:30am &#8211; Samuel Gro\u00df (<a href=\"https:\/\/twitter.com\/5aelo\">@5aelo<\/a>) and Niklas Baumstark (<a href=\"https:\/\/twitter.com\/_niklasb\">_niklasb<\/a>) targeting Apple Safari with an escalation to root on macOS<\/p>\n<p>1:00pm &#8211; Tencent Security &#8211; Ether Team targeting Microsoft Edge<\/p>\n<p>2:00pm &#8211; Chaitin Security Research Lab (<a href=\"https:\/\/twitter.com\/ChaitinTech\">@ChaitinTech<\/a>) targeting Ubuntu Desktop<\/p>\n<p>3:30pm &#8211; Tencent Security &#8211; Ether Team targeting Microsoft Windows<\/p>\n<p>5:00pm &#8211; Ralf-Philipp Weinmann targeting Microsoft Edge with a SYSTEM-level escalation<\/p>\n<p>6:00pm &#8211; Tencent Security &#8211; Team Sniper (Keen Lab and PC Mgr) targeting Google Chrome with a SYSTEM-level escalation<\/p>\n<p>7:30pm &#8211; Tencent Security &#8211; Team Sniper (Keen Lab and PC Mgr) targeting Adobe Reader<\/p>\n<p>8:30pm &#8211; Chaitin Security Research Lab (<a href=\"https:\/\/twitter.com\/ChaitinTech\">@ChaitinTech<\/a>) targeting Apple Safari with an escalation to root on macOS<\/p>\n<p>10:00pm &#8211; Richard Zhu (fluorescence) targeting Apple Safari with an escalation to root on macOS<\/p>\n<p>Due to the number of entries, the schedule for Day Two will not be available until after 5:00pm PDT today.<\/p>\n<p><a href=\"http:\/\/blog.trendmicro.com\/welcome-pwn2own-2017-schedule\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Dustin Childs (Zero Day Initiative Communications)| Date: Wed, 15 Mar 2017 16:59:01 +0000<\/strong><\/p>\n<p>Welcome to Pwn2Own 2017 &#8211; the tenth anniversary of the competition and our largest Pwn2Own ever.\u00a0This is also our largest contest ever with over $1,000,000 USD up for the taking \u2013 and continuing what we started last year, we\u2019ll crown a \u201cMaster of Pwn\u201d as the overall winner on Day Three. As we do every&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[10415],"class_list":["post-6989","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-zero-day-initiative"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6989","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=6989"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6989\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=6989"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=6989"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=6989"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}