The competition
Heres how the contest works.
Security researchers choose the equipment they would like to try and hack into at the time of registration.
They have to carry out the hack in a 30 minute time frame.
As always, the initial vulnerability used in the attack must be in the registered category, Gorenc explained.
The contestant must demonstrate remote code execution by bypassing sandboxes (if applicable) and exfiltrating sensitive information.
The vulnerabilities utilized in the attack must be unpublished zero days.
Samsung Galaxy S5
The particular equipment was pawned not once, but twice.
He successfully managed to brute force a bluetooth connection between 2 devices using a 2-bug attack.
If this sounds familiar, it is a technique used very frequently on the hit series Person of Interest.
Lumia 1520
This machine might have turned out to be the most well protected.
This years Pwn2Own laid out interesting tactics on part of the hackers.
source: www.techworm.net