Hacking Team 3 (@ht3labs) 's Twitter Profile
Hacking Team 3

@ht3labs

bugmaxxing

ID: 1848873055776608259

calendar_today22-10-2024 23:44:28

5 Tweet

58 Followers

5 Following

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

In their #Pwn2Own debut, the team from HT3 Labs (Hacking Team 3) exploited the Phoenix Contact CHARX SEC-3150. They were nice enough to make Zed an honorary member, too. They head off to the disclosure room to explain themselves. #P2OAuto

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Confirmed! The folks from Hacking Team 3 used a missing authentication bug combined with an OS command injection to exploit the Phoenix Contact CHARX. Their 2nd round win nets them $25,000 and 5 Master of Pwn points.

Confirmed! The folks from <a href="/ht3labs/">Hacking Team 3</a> used a missing authentication bug combined with an OS command injection to exploit the Phoenix Contact CHARX. Their 2nd round win nets them $25,000 and 5 Master of Pwn points.
Hacking Team 3 (@ht3labs) 's Twitter Profile Photo

Writeups are literally just hastily written markdown files converted to HTML, so typos and weird grammar might exist. Most importantly, they have full exploit code.