
Hacking Team 3
@ht3labs
bugmaxxing
ID: 1848873055776608259
22-10-2024 23:44:28
5 Tweet
58 Takipçi
5 Takip Edilen




In their #Pwn2Own debut, the team from HT3 Labs (Hacking Team 3) exploited the Phoenix Contact CHARX SEC-3150. They were nice enough to make Zed an honorary member, too. They head off to the disclosure room to explain themselves. #P2OAuto

Confirmed! The folks from Hacking Team 3 used a missing authentication bug combined with an OS command injection to exploit the Phoenix Contact CHARX. Their 2nd round win nets them $25,000 and 5 Master of Pwn points.






