lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20080318165448.17514.qmail@securityfocus.com>
Date: 18 Mar 2008 16:54:48 -0000
From: info@...italarmaments.com
To: bugtraq@...urityfocus.com
Subject: Digital Armaments March-April Hacking Challenge: 5,000$ Prize -
 Client Vulnerabilities and Exploit

Digital Armaments March-April Hacking Challenge: 5,000$ Prize - Client Vulnerabilities and Exploit

Pubblication is 03.15.2008
http://digitalarmaments.com//content/view/46/27/

I. Details

Digital Armaments officially announce the launch of March-April hacking challenge.
The challenge starts on March 1. For the March-April Challenge, Digital Armaments will give a prize of 5,000$ for each submission that results in a Exploitable Vulnerability or Working Exploit for Windows or Windows Diffuse Application. This should include example and documentation.

The submission must be sent during the March/April months and be received by midnight EST on April 30, 2008. The 5,000$ PRIZE will be an extra added to the normal vulnerability payment (check the DACP scheme).

 
II. References

For further information on Digital Armaments Contributor Program (DACP) please refer at the contribute section.
Details of credits value can be found at the contribute section and in the FAQs section.

 

III. Legal Notices

Copyright © 2008 Digital Armaments Inc.

Redistribution of this alert electronically is allowed. It should not be edited in any way. Reprint the whole is allowed, partial reprint is not permitted. For any other request please email customerservice@...italarmaments.com for permission.
Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information. 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ