Re: Pwn2Own 2009
Originally Posted by
conundrumx
To be fair to the software that's been "owned," (especially Safari, which everyone is reporting as "within seconds") these guys have been researching and developing exploits for months in preparation of this event. It's not like they sat down with something they'd never seen before and went from there.
Of course the exploits only take seconds, they're executing code to take over the machine, not downloading the Bee Gees discography.
Very true. I found the Charlie Miller interview interesting.
Microsoft Vista | Ubuntu 8.10
HP | DV6910US
Ubuntu Registered User # 20970
Linux Registered User # 449097
Bookmarks