There will be three distinct, yet related, phases to this contest. The first phase will be a hacker challenge, for which anyone can register to participate. The second stage of the contest will be a market (based on the Phase 1 challenge). Participation in this second phase will be by invitation only, based on performance in the first phase. The third phase of the contest will be a more challenging hacker challenge; this phase may or may not be invitation-only. There are opportunities to earn money in all three phases of the contest. Read on for more details.
All file downloads and uploads necessary for the contest will be possible after the participant has logged in. The market will also be visible, at the appropriate time, after logging in.http://www.hackerchallenge.org/
Bruce Schneier said it a lot of times, too bad some people never listen: "Hacker Challenges prove nothing at all".
ReplyDeleteBruce is right, they don't prove anything...but you could see it as practice and if you get paid for practicing something you love to mess with, then what is the harm?
ReplyDeleteWith that said,
ReplyDeleteRCE Challenges are than your standard run-of-the mill hack my new server challenges. Throwing a box on the internet and telling people to hack it isn't going to show anything. Real bad guys aren't going to drop zerodays on a "honeypot" for the good guys to have...and without a proper motivation nothing will be proven. However, this isn't always the case.
Given the correct conditions and a firm motivation reason, challenges do work. Just this year at CanSecWest, a new Quicktime vuln was released during the Hack-a-Mac challenge, but this wasn't done til after TippingPoint put up 10K to the prize.