Search This Blog

Powered by Blogger.

Blog Archive

Labels

Showing posts with label Hacking Challenge. Show all posts

Hacking Challenge : Hack Tresorit and get $25,000 Bounty

 

Hungarian developers Istvan Lam and Szilveszter Szebeni are offering $25,000 Bounty to any White hat hackers who can hack the layers of defenses protecting their startup "Tresorit" , VentureBeat reports.

Tresorit is intended to offer a truly secure cloud storage service where user's files, passwords, encryption keys never stored in unencrypted form - being referred as high-security alternative to DropBox.

"Files and some corresponding encryption keys can only be decrypted by the people you have explicitly shared with."

The site offers client-side encryption in which the encryption of files is performed before getting into the cloud.  The AES-256 standard is used for encrypting the files.

"All of our data centers employ physical security measures against intrusion, and are equipped with uninterruptible power and backup systems."

$1 Million reward for Hacker who exploiting Google chrome

Google has pledged cash prizes totaling $ million to hacker who successfully exploit the chrome browser next week's CanSecWest security conference. In fact, Chrome is the only browser in the contest's six year history to not be exploited.

Google will reward winning contestants with prizes of $60,000, $40,000, and $20,000 depending on the severity of the exploits they demonstrate on Windows 7 machines running the browser.  Members of the company's security team announced the Pwnium contest on their blog on Monday.

There is no splitting of winnings, and prizes will be awarded on a first-come-first-served basis until the $1 million threshold is reached.

All winners will also receive a Chromebook.

"While we're proud of Chrome's leading track record in past competitions, the fact is that not receiving exploits means that it's harder to learn and improve," wrote members of the Google Chrome security team in a post on Monday. "To maximize our chances of receiving exploits this year, we've upped the ante. We will directly sponsor up to $1 million worth of rewards."

In the blog post, the researchers said Google was withdrawing as a sponsor of the Pwn2Own contest after discovering rule changes allowing hackers to collect prizes without always revealing the full details of the vulnerabilities to browser makers.

Facebook open Registration for Facebook's 2012 Hackers Cup


Facebook Announced open registration for Facebook’s 2nd annual Hacker Cup. Programmers from around the world will be judged on accuracy and speed as they race to solve algorithmic problems to advance through up to five rounds of programming challenges. This is your chance to compete against the world’s best programmers for awesome prizes and the title of World Champion.

The top 25 will be fly into the facebook campus for final rounds and the 1st place prize is $5000 USD. $2,000 for second place, $1,000 for third, and $100 for fourth through 25th. Awesome t-shirts for the top 100 hackers coming out of the second online round.

Details:

The competition commences with a 72-hour Qualification Round on January 20, 2012 at 4:00 PM PT and ends on January 23, 2012 at 4:00 PM PT. All registered competitors will be presented with three problems. Every competitor who correctly solves at least one problem will advance to Online Round 1.

Online Round 1 will last 24 hours from January 28, 2012 at 10:00 AM PT and ends on January 29, 2012 at 10:00 AM PT. To advance to Online Round 2, participants must solve at least one problem correctly. If more than 500 people solve at least one problem correctly, then the top 500 participants will advance, as well as everyone else who answered the same number of questions correctly as the 500th-place contestant.

Online Round 2 will last three hours from February 4, 2012 at 1:00 PM PT and end February 4, 2012 at 4:00 PM PT. The competitors will have three hours to solve the presented problem sets. The top-scoring 100 participants from Online Round 2 will receive an official Hacker Cup t-shirt. The top-scoring 100 competitors from Online Round 2 will be notified via email that they have advanced to Online Round 3.

Online Round 3 will last three hours from February 11, 2012 at 1:00 PM PT and end February 11, 2012 at 4:00 PM PT. The 100 competitors will have three hours to solve the presented problem sets. The top-scoring 25 competitors from Online Round 3 will be notified via email that they have advanced to the final round at Facebook.

Facebook will fly the top-scoring 25 competitors to Menlo Park, California, for the final round of competition on March 17, 2012, where they'll receive some great cash prizes and other awesome goodies. Out of these 25 finalists, one champion will emerge and be immortalized on the Hacker Cup trophy. Finalists will be responsible for obtaining their own entry visa before arrival in the USA; however, Facebook will reimburse the finalist for any visa application fee and up to $100 USD in travel expenses incurred in obtaining the visa. Facebook will not reimburse any fees or expenses related to obtaining a passport.

Check the Hacker Cup page:
https://www.facebook.com/hackercup

Solve the Puzzle and Win a Lego Mindstorm! : #sophospuzzle

Hey wait a second..! This is not spam report, this is real challenge from one of Security Firm "Sophos".  There are two stages in this challenge.  If you solve it, you will get Lego Mindstorm.

Challenge:
Stage 1: Crack this 24 character Code and find the URL to the second stage:
=ImYndmbn1ieiBnLmJWdjJmZ


Stage 2:
Stage Two is a bit tougher. It doesn't require cipher-cracking skills (though they might come in handy). Instead, a bit of lateral thinking should get you to the solution.

Watch out for the hashtag #sophospuzzle on Twitter, or email l.salander@sophos.com for hints.

Conditions:
  • You need to solve the puzzle before midnight on Wednesday 21 December 2011, New York time.
  • There are only 3 Mindstorm so be quick.

About Lego Mindstorm:

The LEGO Mindstorm series of kits contain software and hardware to create small, customizable and programmable robots. They include a programmable 'Brick' computer that controls the system, a set of modular sensors and motors, and LEGO parts from the Technics line to create the mechanical systems

The Global CyberLympics Ethical Hacking Challenge

The Global CyberLympics (www.cyberlympics.org) - the world’s first international team ethical hacking championships - will be held from September across six continents.

It is endorsed by the U.N.’s cybersecurity executing arm – IMPACT - and the EC-Council is sponsoring over $400,000 worth of prizes.

Regional championships will be held in various locations across different continents, and co-hosted with reputable IT/information security conferences and tradeshows, as follows:

  • North America (Eastern) | Hacker Halted USA – Miami, USA
  • North America (Western) | TakeDownCon – Las Vegas, USA
  • South America | H2HC – Sao Paolo, Brazil
  • Europe | Hacktivity – Budapest, Hungary
  • Middle East & India | GITEX – Dubai, UAE
  • Asia Pacific | Hacker Halted APAC – Kuala Lumpur, Malaysia
  • Africa | TakeDownCon – Johannesburg, South Africa

The CyberLympics world finals is tentatively scheduled for the first quarter of 2012, with its venue still being decided.

To compete at the games, simply form a team of between 4-6 players, ensure that all the players attempt and pass the proficiency test to earn a players code. These codes can then be used to register a team to compete against others in the region.

Registration team is waived for a limited time period. To find out how to participate in this groundbreaking event, please visit -> http://www.cyberlympics.org/TheGames/HowtoEnter.aspx

[source]