lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <1329459969.65466.YahooMailNeo@web137306.mail.in.yahoo.com>
Date: Fri, 17 Feb 2012 11:56:09 +0530 (IST)
From: murtuja bharmal <murtuja_bharmal@...oo.com>
To: "full-disclosure@...ts.grok.org.uk" <full-disclosure@...ts.grok.org.uk>,
	"bugtraq@...urityfocus.com" <bugtraq@...urityfocus.com>
Subject: nullcon CTF  "Battle Underground 2012" is on




We are back !!!!!!!!!!!!!!!!!!!!!!!!!

http://nullcon.net/battleunderground/

LaLa Land is going to wage war against Penguin Land.


LaLa Land's newly founded National Hacker's Organization (NHO) is
tasked to penetrate Penguin's Ice Headquarters (IHQ) and gather
information about Penguin deployment plans and orbats.

LaLa Land’s Technical LaLa Division decided to create Teams of Hackers
in NHO and independently task them to gather as much information as
possible.

Your job as a respected member of LaLa Land’s NHO is to penetrate
Penguin Land’s IHQ network and gather as much documents as you can
which will earn you brownie points.

Rules
______

This is an open ended contest and the winner will be declared based on maximum score at the end of day 2. The winner will be contacted via the e-mail address they use for registration.


Player need to create an account in order to participate in the challenge. 

Please use a valid email address as the account needs to be validated before you can start the fun.
Only the First Person to complete challenge will win SANS SEC 504: Hacker Techniques, Exploits & Incident Handling Class (worth $4095)

Battle Underground (2012) does NOT give participants any legal permission to exploit http://nullcon.net or its hosting partner in a destructive manner . Any attack against the site or the hosted servers will be observed under general legal framework.

The winner can claim his prize only after submission of very brief writeup  (Vulnerability found) of the contest and his solution / approach

The unofficial back channel for Battle Underground (2012) is irc.chat4all.org #nullcon
Follow us on @nullcon for twitter updates.

Cheers
|\/|
Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ