How much does it take to hack a mobile network?
Is electronic government secure
in the era of WikiLeaks and Anonymous?

Is SCADA hacking a Hollywood fiction
or the nowadays reality?
Internet banking: is there any chance to win
over the fraudsters?

Cyber-crimes, cyber-espionage, cyber-war: where do we draw a borderline?

Pages

Tuesday, May 7, 2013

NetHack: Win Invitation to PHDays!

The Positive Hack Days III program promises to be quite rich: reports, hands-on labs of the world leading experts, the CTF hacking battle, the Young School finalists’ presentations and a great number of competitions (held both online and at the venue).

This time, to partake in the forum you can buy a ticket. But, anyway, is it the right path of a real hacker? It is much more interesting to get the ticket by fighting other specialists in information security. In case you think the same way, the NetHack contest is held for you.

During the contest, the participants will be able to demonstrate their skills in obtaining control over a network infrastructure by exploiting insecure configuration of the equipment.

Participation Rules

The contest consists of two rounds. The participants, who passed the qualifying round, will get the tickets to Positive Hack Days III. In the final, the participants should obtain control over the network during a limited period of time, then get to a nonroutable segment which contains a special automated system and get access to the system itself.

Anyone can take part in the competition. Directions for participants and the qualifying round task are available at http://phdays.ru/download/NetHack_qualifying_round.zip.

Prizes

The winners will receive keepsakes from the PHDays organizers (Positive Technologies) and sponsors of the forum.

Technical Details

The selection and usage of equipment that may be needed to partake in the contest is up to the participants.

No comments:

Post a Comment