TianfuCup

@TianfuCup

Tianfu Cup PWN Contest Official Account

Vrijeme pridruživanja: studeni 2018.

Tweetovi

Blokirali ste korisnika/cu @TianfuCup

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @TianfuCup

  1. 18. stu 2019.

    In case you’re misled, here’s the correct account for the winner of both + -kvm and really impressive demos!

    Poništi
  2. 17. stu 2019.
    Poništi
  3. 16. stu 2019.

    Congratulations to 360Vulcan to become the biggest winner of 2019 winning a total bonus of $382,500!

    Poništi
  4. 16. stu 2019.

    Some number reviews for the two-day 2019 PWN contest: 17 teams delivered 28 on-site demonstrations with 20 successful and 8 failed 11 teams have gained bonus 8 targets been taken down Total bounty of $545,000 awarded! Thanks everyone for participating!

    Poništi
  5. 16. stu 2019.

    Plus the 3 successful entries yesterday, 7 teams won the bonus on DIR-878 (total bonus $5,000): StackLeader $1,250 ddd $1,250 NoTrace Security Lab $800 HAC $500 360 Information Security Center $500 360 Chengdu Security $350 SISLAB PWN $350 Congrats to all of them!

    Poništi
  6. 16. stu 2019.

    Today, 4 more teams also succeeded in hacking the D-Link DIR-878: ddd, 360 Information Security Center , 360 Chengdu Security Team , and SISLAB PWN . The final bonus will be announced soon.

    Poništi
  7. 16. stu 2019.
    Poništi
  8. 16. stu 2019.

    Verified to be a success! Congrats to 360Vulcan on wining $200,000 - the highest bonus of 2019!

    Poništi
  9. 16. stu 2019.

    Amazing! 360Vulcan successfully escaped from the and controled the host’s operating system within 24 seconds. Now, they went to the review room with the judges. Let's wait patiently for the final result.

    Poništi
  10. 16. stu 2019.

    The final result for PDF Reader comes out! Another two teams Team ddd and 360Vulcan also successfully got RCE. The 4 wining teams will all get $7,500 to each. Congrats!

    Poništi
  11. 16. stu 2019.

    Day 2 Teams abandoned the attempts on Ubuntu 19.10/CentOS 8 and Windows Server 2019. After two successful demos on PDF reader from ddd and 360Vulcan (verifying), now teams will take their chance in taking down VMWare.

    Poništi
  12. 16. stu 2019.

    The credit of team ddd on exploiting Chrome goes to Zhen Feng and Congrats again and thanks for the excellent demenstration!

    Poništi
  13. 16. stu 2019.

    The winner of the entry of Ubuntu + qemu-kvm is here

    Prikaži ovu nit
    Poništi
  14. 16. stu 2019.

    Brief review for Day 1: 20 demonstrations, with 13 being successful, 5 teams gained bonus. 6 targets were taken down , , , PDF Reader, , , + qemu-kvm Come back tomorrow at 9am!

    Poništi
  15. 16. stu 2019.

    The exploit on Ubuntu + -kvm achieved partially control of the host. A bonus of $80,000 was won by 360Vulcan being the highest bounty for a single exploit in Day 1 .

    Prikaži ovu nit
    Poništi
  16. 16. stu 2019.

    Three teams HAC, team StackLeader and team NoTrace Security Lab controlled DIR-878 successfully. There will be several other teams working on this target tomorrow. Let’s wait for the bonus result tomorrow.

    Poništi
  17. 16. stu 2019.

    Two successful RCE demonstrations today on PDF Reader are from Bit-STARLabs and StackLeader . Tomorrow the attempts on Adobe will continue, we will know the final bonus distribution by then.

    Poništi
  18. 16. stu 2019.

    Applause to 360Vulcan He has successfully escaped from the -kvm, and execute arbitrary code on Ubuntu host’s operating System. The exploit is to be verified.

    Poništi
  19. 15. stu 2019.

    The entry on ProPlus is acheived by downloading a rtf document via Edge. It partially bypassed the to gain the control. A bonus of $40,000 is awarded to 360Vulcan

    Poništi
  20. 15. stu 2019.

    Congrats to the team!

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·